•  
  •  
 

Abstract

Educational institutions are facing increasingly complex cyber threats, particularly as they continue to rely on on-premises servers with limited cybersecurity resources. Zero Trust Architecture (ZTA) offers a security model that rejects implicit trust and requires strict verification of each access request. This study aims to examine the applicability of ZTA in managing local servers within educational institutions through a qualitative literature review approach. Relevant literature from 2014 to 2025 was analyzed using thematic synthesis to identify recurring concepts, strategies, and gaps. The results show that ZTA, when integrated with Identity and Access Management (IAM), Security Information and Event Management (SIEM), and real-time monitoring tools like Zabbix, Prometheus, and Grafana, significantly enhances network security by implementing granular access controls and continuous monitoring. However, the implementation is constrained by limited infrastructure and IT governance maturity in many institutions. This research is considered significant because it addresses a pressing gap in the cybersecurity practices of educational institutions, which often lack the robust frameworks and resources found in the corporate sector. By offering an adaptable and scalable ZTA-based security framework, the study contributes to advancing secure digital infrastructure and data protection in the education domain. Therefore, a strategic and phased adoption is recommended, supported by IT governance frameworks such as COBIT. This study contributes a conceptual framework that links ZTA, server monitoring, and institutional readiness, and offers recommendations for building sustainable cybersecurity strategies in the educational sector.

References

Akamai Technologies. (2022). Zero Trust: What It Means and How to Get There Faster [White Paper].

Bansal, P. (2024). Zero Trust Security: Is it Optional? International Journal of Innovative Science and Research Technology (IJISRT), 3336–3339. https://doi.org/10.38124/ijisrt/IJISRT24SEP1521

Bashir, T. (2024). Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks. Journal of Computer Science and Technology Studies, 6(4), 54–59. https://doi.org/10.32996/jcsts.2024.6.4.8

Filho, W. L. R. (2025). The Role of Zero Trust Architecture in Modern Cybersecurity: Integration with IAM and Emerging Technologies. Brazilian Journal of Development, 11(1), e76836. https://doi.org/10.34117/bjdv11n1-060

Fortinet. (2024). Ransomware statistics. Https://Www.Fortinet.Com/Resources/Cyberglossary/Ransomware-Statistics.

Greene, B. A., & Burton, S. L. (2024). Organizational Readiness for Artificial Intelligence (AI) in Network Security (pp. 205–246). https://doi.org/10.4018/979-8-3693-8562-3.ch007

Hasan, M. (2024). Enhancing Enterprise Security with Zero Trust Architecture: Mitigating Vulnerabilities and Insider Threats through Continuous Verification and Least Privilege Access.

idcloudhost. (2025, May 21). Mengenal Administrasi Serve Serta Skill yang Harus Dimiliki.

International Telecommunication Union. (2024a). Global Cybersecurity Index (GCI) 2024. Https://Www.Itu.Int/Epublications/Publication/Global-Cybersecurity-Index-2024.

International Telecommunication Union. (2024b). Measuring digital development: ICT Development Index (IDI) 2024. Https://Www.Itu.Int/Hub/Publication/d-Ind-Ict_mdd-2024-3/.

Jimmy, F. (2022). Zero Trust Security: Reimagining Cyber Defense for Modern Organizations. International Journal of Scientific Research and Management (IJSRM), 10(04), 887–905. https://doi.org/10.18535/ijsrm/v10i4.ec11

Kumar, A., Salmona, M., Berry, R., & Grummert, S. (2024). Digital transformation preparedness: an exploratory study. Digital Transformation and Society, 3(2), 127–144. https://doi.org/10.1108/DTS-07-2023-0051

Kumar, R. (2024). An Extensive Analysis on Zero Trust Architecture. International Journal of Innovative Science and Research Technology (IJISRT), 1056–1061. orphttps://doi.org/10.38124/ijisrt/IJISRT24MAY1225

Microsoft. (2025, May 23). Azure security technical capabilities.

Nugroho, R. A. (2019). ANALISA MANAGEMENT SISTEM PADA UNIVERSITAS MENGGUNAKAN COBIT. Jurnal RESISTOR (Rekayasa Sistem Komputer), 2(2), 76–82. https://doi.org/10.31598/jurnalresistor.v2i2.433

Oliver, I. (2023, July 26). Understanding Zero Trust: Forrester’s Definition. Https://Silicon.Co.Nz/Index.Php/Blog/Understanding-Zero-Trust-Forresters-Definition/#:~:Text=Forrester%20Research%20defines%20Zero%20Trust,And%20dynamic%20approach%20to%20security.

Putra, A. P., Sukadarmika, G., & Wiharta, D. M. (2024). Model Utilisasi Dan Visualisasi Resource Menggunakan Prometheus Dan Grafana Untuk Pengelolaan Server Di Universitas Udayana. Majalah Ilmiah Teknologi Elektro, 22(2), 305. https://doi.org/10.24843/MITE.2023.v22i02.P19

Rahma, A., Indriyani, F., & Sandi, T. A. A. (2023). Perancangan Dan Implementasi Monitoring Perangkat Server Menggunakan Zabbix Pada PT. Rizki Tujuh Belas Kelola. Jurnal INSAN Journal of Information System Management Innovation, 3(2), 85–95. https://doi.org/10.31294/jinsan.v3i2.3009

Rasyidi, B., & Pratama, F. (2024). Sistem Monitoring Server di PT. XYZ Media Indonesia Berbasis Grafana dan Prometheus. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 4(4), 1456–1465. https://doi.org/10.57152/malcom.v4i4.1546

Saputra, Moch. Y. E., Noprianto, Noor Arief, S., Wijayaningrum, V. N., & Syaifudin, Y. W. (2024). Real-Time Server Monitoring and Notification System with Prometheus, Grafana, and Telegram Integration. 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS), 1808–1813. https://doi.org/10.1109/ICETSIS61505.2024.10459488

Taufiqurrohman, F., Resmanda, F., Ardilla, L., Rona, M. N., & Jamal, M. N. K. (2024). Implementasi Monitoring Jaringan dengan Zabbix pada Server Linux Ubuntu: Studi Kasus pada Lingkungan Infrastruktur IT. Karimah Tauhid, 3(8), 8750–8756. https://doi.org/10.30997/karimahtauhid.v3i8.14327

Wahab, N. K. (2016). PENERAPAN LAYANAN KOMPUTASI AWAN UNTUK SISTEM MANAJEMEN PENGETAHUAN PADA INSTITUSI PENDIDIKAN TINGGI. Rabit : Jurnal Teknologi Dan Sistem Informasi Univrab, 1(2), 37–45. https://doi.org/10.36341/rabit.v1i2.21

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.