Bertino, 2021

Zero Trust Architecture: Does It Help?

Authors

Bertino, E.

Identifiers

DOI: 10.1109/MSEC.2021.3091195

Publication

IEEE Security Privacy, Vol. 19, Issue 5, Pages 95-96

Abstract

Discusses the concept of zero trust architecture (ZTA). ZTA has been introduced as a fine-grained defense approach paradigm that shifts defenses from static, network-based perimeters to users, assets, and resources.1 It assumes that no entities outside and inside the protected system can be trusted and therefore requires articulated and high-coverage deployment of security controls, such as authentication and access control. In a way, ZTA is not new; the idea that securing a system requires pervasive, fine-grained, and continuous deployment of layered security controls is quite obvious. However, the current emphasis on ZTA is important as it pushes systematic approaches to cybersecurity.

(https://ieeexplore.ieee.org/document/9529255, p. 1)

Citation

Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195

Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96.

 


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.