2020
DOI: 10.1088/1742-6596/1651/1/012010
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation Method of Zero-trust Architecture

Abstract: With the development of the Internet, the company network architecture is also undergoing profound changes, and the boundaries between the original internal network and external network are becoming increasingly blurred with the emergence of cloud services. More and more company businesses are deployed on the cloud server, which increases the risk of data exchange between the cloud server and the intranet. An implementation method of zero-trust architecture is proposed in this paper to apply to this scenario. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 0 publications
0
3
0
1
Order By: Relevance
“…The study on Forrester ® and the 2017 IBM X-Force report provide a strong motivation to more comprehensively implement the zero trust model in the network. Meanwhile, adopts the zero trust model in intranet data to secure the authentication when users want to access intranet data [22]. This method or architecture can more effectively protect network communication.…”
Section: Zero Trust Model-based Information Securitymentioning
confidence: 99%
“…The study on Forrester ® and the 2017 IBM X-Force report provide a strong motivation to more comprehensively implement the zero trust model in the network. Meanwhile, adopts the zero trust model in intranet data to secure the authentication when users want to access intranet data [22]. This method or architecture can more effectively protect network communication.…”
Section: Zero Trust Model-based Information Securitymentioning
confidence: 99%
“…In 2020, Chuan T et al [51] proposed a method for implementing the concept of zero trust, which described seven evaluation elements of zero trust evaluation: required procedures (including weak password detection procedures, website detection procedures, configuration detection procedures, host vulnerability detection programs, brute force protection programs, hardening programs, mandatory access control programs, and micro-isolation control programs), operating system security vulnerabilities, network security vulnerabilities, weak passwords, high-risk ports, sensitive information protection, and accounts and passwords.…”
Section: Review On Trust Assessment Algorithmmentioning
confidence: 99%
“…This challenge is exacerbated by the advent of quantum computing, 2 which poses significant risks to traditional encryption methods. The zero trust security model, 3,4 which assumes no implicit trust and verifies each request as though it originates from an open network, offers a paradigm shift in securing IT environments. This model's core principle of "never trust, always verify" aligns with the needs of modern distributed computing frameworks, such as federated learning.…”
Section: Introductionmentioning
confidence: 99%