International Journal of Computer Technology and Science
Vol. 2 No. 3 (2025): International Journal of Computer Technology and Science

An Implementation of Cloudflare's Zero Trust Network Access at PT FHI

Febriyan, Rizky (Unknown)
Yuliadi, Boy (Unknown)



Article Info

Publish Date
31 Jul 2025

Abstract

The increasing vulnerabilities of modern enterprise network security systems highlight the necessity of adopting a more comprehensive and adaptive security approach than traditional VPN infrastructures. This study explores the design and implementation of Zero Trust Network Access (ZTNA) using the Cloudflare platform at PT FHI, focusing on addressing the weaknesses caused by uncontrolled remote access and legacy security models. The research adopts an experimental methodology based on the Network Development Life Cycle (NDLC), which includes systematic phases such as needs analysis, architectural design, system implementation, testing, and performance evaluation. Data were collected through structured interviews with IT managers and security specialists, direct observation of network logs, and comprehensive testing involving three different categories of end users. The findings demonstrate significant improvements in role-based access control, granular authentication, and the elimination of unrestricted access to internal resources. Additionally, real-time monitoring and alerting features available through the Cloudflare dashboard enhance visibility and responsiveness to potential threats. The implemented system successfully applies the “never trust, always verify” principle by blocking unauthorized access attempts, enforcing continuous validation, and producing detailed audit logs. Performance evaluation results confirm stable connections, acceptable latency for critical business applications, and an overall improvement in network security posture while maintaining operational productivity across departments..

Copyrights © 2025






Journal Info

Abbrev

IJCTS

Publisher

Subject

Computer Science & IT

Description

This Journal accepts manuscripts based on empirical research, both quantitative and qualitative. The scope of the this Journal covers the fields of Computer Technology and Science. This journal is a means of publication and a place to share research and development work in the field of ...