ACI Journal Articles


Toward a Zero Trust Architecture Implementation in a University Environment

Document Type


USMA Research Unit Affiliation

Army Cyber Institute

Publication Date

Fall 11-15-2021


The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.

Peer Reviewed


Record links to items hosted by external providers may require fee for full-text.