Authors :
Prashant Bansal
Volume/Issue :
Volume 9 - 2024, Issue 9 - September
Google Scholar :
https://tinyurl.com/mraewzux
Scribd :
https://tinyurl.com/3chbzzp3
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24SEP1521
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Zero Trust Architecture (ZTA) is a
cybersecurity model that authenticates and authorizes
every interaction between a user or device and a
network. It's based on the idea that "trust is good, but
control is better", and assumes that all networks and
traffic could be potential threats. ZTA goes beyond the
traditional "trust but verify" approach, by treating
every access request as potentially dangerous and
requiring a thorough check before granting access. This
is regardless of the requester's identity or location. Zero
Trust is a security model that assumes nothing should be
trusted automatically, even within a network. It requires
all users, regardless of location, to be verified and
authorized before accessing resources. This is achieved
through strict security measures like multi-factor
authentication, advanced endpoint protection, and
robust identity management. Today, people expect to
access applications and data anytime, anywhere. With
the rise of cloud computing and IoT, the number of
connected devices and potential attack points is growing.
To protect data and networks, we need a new approach.
This article explains what Zero Trust is and some of its
key principles.
Keywords :
ZTNA, Zerotrust, Security, Authentication, Authorization, Cyberthreat, Cybersecurity, Zero Trust Security.
References :
- Weidman J, Grossklags J (2017) I Like It but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017) (ACM, Orlando, FL), pp 212-224. https://doi.org/10.1145/3134600.3134629
- Publication, IJRASET. “A Zero Trust Framework Security to Prevent Data Breaches and Mitigate the Cloud Network Attacks.” International Journal for Research in Applied Science & Engineering Technology (IJRASET) 10.V (2022): 3530–3538. Web. https://doi.org/10.22214/ijraset.2022.42976
- onome edo. “Zero Trust Architecture: Trend and Impact on Information Security.” International Journal of Emerging Technology and Advanced Engineering (2022): n. pag. Web. https://doi.org/10.46338/ijetae0722_15
- Bobbert, Yuri. “Zero Trust Validation: From Practical Approaches to Theory.” Scientific Journal of Research & Reviews 2.5 (2020): n. pag. Web. http://dx.doi.org/10.33552/SJRR.2020.02.000546
- SendhilVelan, SiVa. “Zero Trust Networking -Effects on Cyber Risk & Challenges.” Zero Trust Networking -Effects on Cyber Risk & Challenges (2019): n. pag. Print.
- Chaturvedi, Ikshit & Pawar, Pranav & Muthalagu, Raja & Periyasamy, Tamizharasan. (2024). Zero Trust Security Architecture for Digital Privacy in Healthcare. 10.1007/978-981-97-0407-1_1.
Zero Trust Architecture (ZTA) is a
cybersecurity model that authenticates and authorizes
every interaction between a user or device and a
network. It's based on the idea that "trust is good, but
control is better", and assumes that all networks and
traffic could be potential threats. ZTA goes beyond the
traditional "trust but verify" approach, by treating
every access request as potentially dangerous and
requiring a thorough check before granting access. This
is regardless of the requester's identity or location. Zero
Trust is a security model that assumes nothing should be
trusted automatically, even within a network. It requires
all users, regardless of location, to be verified and
authorized before accessing resources. This is achieved
through strict security measures like multi-factor
authentication, advanced endpoint protection, and
robust identity management. Today, people expect to
access applications and data anytime, anywhere. With
the rise of cloud computing and IoT, the number of
connected devices and potential attack points is growing.
To protect data and networks, we need a new approach.
This article explains what Zero Trust is and some of its
key principles.
Keywords :
ZTNA, Zerotrust, Security, Authentication, Authorization, Cyberthreat, Cybersecurity, Zero Trust Security.