Skip to end of banner
Go to start of banner

Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Zero Trust Architecture: Does It Help?

Authors

Bertino, E.

Identifiers

  • DOI: 10.1109/MSEC.2021.3091195

Publication

IEEE Security Privacy, Vol. 19, Issue 5, Pages 95-96

Abstract

Discusses the concept of zero trust architecture (ZTA). ZTA has been introduced as a fine-grained defense approach paradigm that shifts defenses from static, network-based perimeters to users, assets, and resources.1 It assumes that no entities outside and inside the protected system can be trusted and therefore requires articulated and high-coverage deployment of security controls, such as authentication and access control. In a way, ZTA is not new; the idea that securing a system requires pervasive, fine-grained, and continuous deployment of layered security controls is quite obvious. However, the current emphasis on ZTA is important as it pushes systematic approaches to cybersecurity.

(https://ieeexplore.ieee.org/document/9529255, p. 1)

Citation

Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195

Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195

  • No labels