NORMA eResearch @NCI Library

Analysis of automated zero trust AWS home network for confidentiality and authentication issues

Rashid, Wahaj (2024) Analysis of automated zero trust AWS home network for confidentiality and authentication issues. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
Preview
PDF (Master of Science)
Download (1MB) | Preview
[thumbnail of Configuration Manual]
Preview
PDF (Configuration Manual)
Download (1MB) | Preview

Abstract

In a home network environment, this research investigates the issues of maintaining confidentiality and ensuring authentication issues that involve unauthorized access, data leakage, and insufficient segmentation of the network which are common. Moreover, this research also addresses traditional approaches like Virtual Private Network-based solutions which often fail to effectively address the evolving challenges of securing home networks, particularly when it comes to managing access for multiple users and devices while maintaining high levels of confidentiality and authentication. These issues could be resolved by using a Zero Trust orchestrator like Twingate and its automation with Infrastructure as Code could help to integrate the architecture in a home network for a secure environment. This research explores and evaluates the principle of Zero Trust which is “never trust, always verify” to prevent security risks that involve confidentiality and authentication with automation. It shows how the Zero Trust framework plays its role in home security including methods of Multi-Factor Authentication, Access Control, Biometrics, Encryption mechanisms like AES256 and KMS, and network segmentation to prevent data leakage and ensure confidentiality. Moreover, it allows verified and authenticated users from outside the network to get into the network and use its resources, which could not be possible by using a Virtual Private Network. To justify the Zero Trust Model in this research. A Cloud platform AWS has used in the network with its services like for computing EC2 and S3 for encrypted storage and Access Control List for policy enforcement. These services are tested to provide a secure environment for a user in a home network and its whole configuration is done by using Infrastructure as Code that automates everything and provides a scalable, repeatable Zero Trust model with fewer chances of human error involvement and time-saving The results in the form data encryption, network segmentation and access management with user and its device authentication validates that Zero Trust in resolving the security issues critical in a home network and provide resilient environment that could be integrated with automation instead of using traditional VPN solutions. This research not only goes through the Zero Trust principles but also validates its automation that can be used for both enterprise and personal networks to overcome the challenges of confidentiality and authentication.

Item Type: Thesis (Masters)
Supervisors:
Name
Email
Verma, Rohit
UNSPECIFIED
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Cloud computing
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Ciara O'Brien
Date Deposited: 28 Jul 2025 10:17
Last Modified: 28 Jul 2025 10:17
URI: https://norma.ncirl.ie/id/eprint/8250

Actions (login required)

View Item View Item