Abstract
Educational institutions are facing increasingly complex cyber threats, particularly as they continue to rely on on-premises servers with limited cybersecurity resources. Zero Trust Architecture (ZTA) offers a security model that rejects implicit trust and requires strict verification of each access request. This study aims to examine the applicability of ZTA in managing local servers within educational institutions through a qualitative literature review approach. Relevant literature from 2014 to 2025 was analyzed using thematic synthesis to identify recurring concepts, strategies, and gaps. The results show that ZTA, when integrated with Identity and Access Management (IAM), Security Information and Event Management (SIEM), and real-time monitoring tools like Zabbix, Prometheus, and Grafana, significantly enhances network security by implementing granular access controls and continuous monitoring. However, the implementation is constrained by limited infrastructure and IT governance maturity in many institutions. This research is considered significant because it addresses a pressing gap in the cybersecurity practices of educational institutions, which often lack the robust frameworks and resources found in the corporate sector. By offering an adaptable and scalable ZTA-based security framework, the study contributes to advancing secure digital infrastructure and data protection in the education domain. Therefore, a strategic and phased adoption is recommended, supported by IT governance frameworks such as COBIT. This study contributes a conceptual framework that links ZTA, server monitoring, and institutional readiness, and offers recommendations for building sustainable cybersecurity strategies in the educational sector.
References
Akamai Technologies. (2022). Zero Trust: What It Means and How to Get There Faster [White Paper].
Bansal, P. (2024). Zero Trust Security: Is it Optional? International Journal of Innovative Science and Research Technology (IJISRT), 3336–3339. https://doi.org/10.38124/ijisrt/IJISRT24SEP1521
Bashir, T. (2024). Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks. Journal of Computer Science and Technology Studies, 6(4), 54–59. https://doi.org/10.32996/jcsts.2024.6.4.8
Filho, W. L. R. (2025). The Role of Zero Trust Architecture in Modern Cybersecurity: Integration with IAM and Emerging Technologies. Brazilian Journal of Development, 11(1), e76836. https://doi.org/10.34117/bjdv11n1-060
Fortinet. (2024). Ransomware statistics. Https://Www.Fortinet.Com/Resources/Cyberglossary/Ransomware-Statistics.
Greene, B. A., & Burton, S. L. (2024). Organizational Readiness for Artificial Intelligence (AI) in Network Security (pp. 205–246). https://doi.org/10.4018/979-8-3693-8562-3.ch007
Hasan, M. (2024). Enhancing Enterprise Security with Zero Trust Architecture: Mitigating Vulnerabilities and Insider Threats through Continuous Verification and Least Privilege Access.
idcloudhost. (2025, May 21). Mengenal Administrasi Serve Serta Skill yang Harus Dimiliki.
International Telecommunication Union. (2024a). Global Cybersecurity Index (GCI) 2024. Https://Www.Itu.Int/Epublications/Publication/Global-Cybersecurity-Index-2024.
International Telecommunication Union. (2024b). Measuring digital development: ICT Development Index (IDI) 2024. Https://Www.Itu.Int/Hub/Publication/d-Ind-Ict_mdd-2024-3/.
Jimmy, F. (2022). Zero Trust Security: Reimagining Cyber Defense for Modern Organizations. International Journal of Scientific Research and Management (IJSRM), 10(04), 887–905. https://doi.org/10.18535/ijsrm/v10i4.ec11
Kumar, A., Salmona, M., Berry, R., & Grummert, S. (2024). Digital transformation preparedness: an exploratory study. Digital Transformation and Society, 3(2), 127–144. https://doi.org/10.1108/DTS-07-2023-0051
Kumar, R. (2024). An Extensive Analysis on Zero Trust Architecture. International Journal of Innovative Science and Research Technology (IJISRT), 1056–1061. orphttps://doi.org/10.38124/ijisrt/IJISRT24MAY1225
Microsoft. (2025, May 23). Azure security technical capabilities.
Nugroho, R. A. (2019). ANALISA MANAGEMENT SISTEM PADA UNIVERSITAS MENGGUNAKAN COBIT. Jurnal RESISTOR (Rekayasa Sistem Komputer), 2(2), 76–82. https://doi.org/10.31598/jurnalresistor.v2i2.433
Oliver, I. (2023, July 26). Understanding Zero Trust: Forrester’s Definition. Https://Silicon.Co.Nz/Index.Php/Blog/Understanding-Zero-Trust-Forresters-Definition/#:~:Text=Forrester%20Research%20defines%20Zero%20Trust,And%20dynamic%20approach%20to%20security.
Putra, A. P., Sukadarmika, G., & Wiharta, D. M. (2024). Model Utilisasi Dan Visualisasi Resource Menggunakan Prometheus Dan Grafana Untuk Pengelolaan Server Di Universitas Udayana. Majalah Ilmiah Teknologi Elektro, 22(2), 305. https://doi.org/10.24843/MITE.2023.v22i02.P19
Rahma, A., Indriyani, F., & Sandi, T. A. A. (2023). Perancangan Dan Implementasi Monitoring Perangkat Server Menggunakan Zabbix Pada PT. Rizki Tujuh Belas Kelola. Jurnal INSAN Journal of Information System Management Innovation, 3(2), 85–95. https://doi.org/10.31294/jinsan.v3i2.3009
Rasyidi, B., & Pratama, F. (2024). Sistem Monitoring Server di PT. XYZ Media Indonesia Berbasis Grafana dan Prometheus. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 4(4), 1456–1465. https://doi.org/10.57152/malcom.v4i4.1546
Saputra, Moch. Y. E., Noprianto, Noor Arief, S., Wijayaningrum, V. N., & Syaifudin, Y. W. (2024). Real-Time Server Monitoring and Notification System with Prometheus, Grafana, and Telegram Integration. 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS), 1808–1813. https://doi.org/10.1109/ICETSIS61505.2024.10459488
Taufiqurrohman, F., Resmanda, F., Ardilla, L., Rona, M. N., & Jamal, M. N. K. (2024). Implementasi Monitoring Jaringan dengan Zabbix pada Server Linux Ubuntu: Studi Kasus pada Lingkungan Infrastruktur IT. Karimah Tauhid, 3(8), 8750–8756. https://doi.org/10.30997/karimahtauhid.v3i8.14327
Wahab, N. K. (2016). PENERAPAN LAYANAN KOMPUTASI AWAN UNTUK SISTEM MANAJEMEN PENGETAHUAN PADA INSTITUSI PENDIDIKAN TINGGI. Rabit : Jurnal Teknologi Dan Sistem Informasi Univrab, 1(2), 37–45. https://doi.org/10.36341/rabit.v1i2.21
Recommended Citation
Purwanto, Joko and Kurniawan, Safar Dwi
(2026)
"Implementation of Zero Trust Architecture on Local Server Management in Educational Institutions,"
Journal of Strategic and Global Studies: Vol. 9:
Iss.
1, Article 4.
DOI: 10.7454/jsgs.v9i1.1195
Available at:
https://scholarhub.ui.ac.id/jsgs/vol9/iss1/4
Included in
American Studies Commons, Arabic Language and Literature Commons, Arabic Studies Commons, Asian Studies Commons, Chinese Studies Commons, Computer and Systems Architecture Commons, Eastern European Studies Commons, Economics Commons, European Languages and Societies Commons, Feminist, Gender, and Sexuality Studies Commons, International Relations Commons, Islamic Studies Commons, Japanese Studies Commons, Near and Middle Eastern Studies Commons, Scandinavian Studies Commons, Social Justice Commons, Sociology Commons, South and Southeast Asian Languages and Societies Commons, Strategic Management Policy Commons, Urban Studies and Planning Commons

