Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Zero Trust Architecture: Does It Help?

Authors

Bertino, E.

Identifiers

DOI: 10.1109/MSEC.2021.3091195

Publication

IEEE Security Privacy, Vol. 19, Issue 5, Pages 95-96

Abstract

Discusses the concept of zero trust architecture (ZTA). ZTA has been introduced as a fine-grained defense approach paradigm that shifts defenses from static, network-based perimeters to users, assets, and resources.1 It assumes that no entities outside and inside the protected system can be trusted and therefore requires articulated and high-coverage deployment of security controls, such as authentication and access control. In a way, ZTA is not new; the idea that securing a system requires pervasive, fine-grained, and continuous deployment of layered security controls is quite obvious. However, the current emphasis on ZTA is important as it pushes systematic approaches to cybersecurity.

(https://ieeexplore.ieee.org/document/9529255, p. 1)

Citation

Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195

Excerpt

Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195