Bertino, 2021
Zero Trust Architecture: Does It Help?
Authors
Bertino, E.
Identifiers
DOI: 10.1109/MSEC.2021.3091195
Publication
IEEE Security Privacy, Vol. 19, Issue 5, Pages 95-96
Abstract
Discusses the concept of zero trust architecture (ZTA). ZTA has been introduced as a fine-grained defense approach paradigm that shifts defenses from static, network-based perimeters to users, assets, and resources.1 It assumes that no entities outside and inside the protected system can be trusted and therefore requires articulated and high-coverage deployment of security controls, such as authentication and access control. In a way, ZTA is not new; the idea that securing a system requires pervasive, fine-grained, and continuous deployment of layered security controls is quite obvious. However, the current emphasis on ZTA is important as it pushes systematic approaches to cybersecurity.
Links
Citation
Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195
Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.