Zero Trust Architecture: Does It Help?
Authors
Bertino, E.
Identifiers
DOI: 10.1109/MSEC.2021.3091195
Publication
IEEE Security Privacy, Vol. 19, Issue 5, Pages 95-96
Abstract
Discusses the concept of zero trust architecture (ZTA). ZTA has been introduced as a fine-grained defense approach paradigm that shifts defenses from static, network-based perimeters to users, assets, and resources.1 It assumes that no entities outside and inside the protected system can be trusted and therefore requires articulated and high-coverage deployment of security controls, such as authentication and access control. In a way, ZTA is not new; the idea that securing a system requires pervasive, fine-grained, and continuous deployment of layered security controls is quite obvious. However, the current emphasis on ZTA is important as it pushes systematic approaches to cybersecurity.
(https://ieeexplore.ieee.org/document/9529255, p. 1)
Links
Citation
Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195
Bertino, E., 2021. Zero Trust Architecture: Does It Help? IEEE Security Privacy 19, 95–96. https://doi.org/10.1109/MSEC.2021.3091195