2021
DOI: 10.1016/j.cose.2021.102436
|View full text |Cite
|
Sign up to set email alerts
|

Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0
3

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 123 publications
(43 citation statements)
references
References 29 publications
0
40
0
3
Order By: Relevance
“…In essence, ZTS is a multilayer cybersecurity approach, including defence-in-depth controls [24]. It enables a resilient, consistent, and responsive approach to mitigate threat risks that could materialise due to sophisticated attacks and anomalies [12,25]. e practice is rooted in the principle of "never trust, always verify.…”
Section: Zero-trust Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In essence, ZTS is a multilayer cybersecurity approach, including defence-in-depth controls [24]. It enables a resilient, consistent, and responsive approach to mitigate threat risks that could materialise due to sophisticated attacks and anomalies [12,25]. e practice is rooted in the principle of "never trust, always verify.…”
Section: Zero-trust Securitymentioning
confidence: 99%
“…Approaches are required to minimise the impact of security breaches and prevent threat-actor lateral movement by segmenting access across the network and applications. Security policies [25] are needed that consider identity and contextual information from the entities where appropriate. Segmentation at the network and application layers drastically reduces the risk of a threat actor laterally moving between network subnets and application tiers.…”
Section: Securementioning
confidence: 99%
“…Every organization can adapt to ZTA differently depending on different organizational and technological factors. In this section, we extracted seventeen components of ZTA by reviewing various academic and industry resources (Modderkolk, 2018;Chowdhury, 2019;Rivas, 2019;Embrey, 2020;Rose et al, 2020;Uttecht, 2020;Alevizos, Ta and Hashem Eiza, 2021;Banach, 2021;Buck et al, 2021;Checkpoint, 2021;Colortokens, 2021;Garbis and Chapman, 2021;Sanders et al, 2021)…”
Section: Apt Analysismentioning
confidence: 99%
“…economic analysis [17], intrusion detection [4] and authentication [132]. Yan and Wang [151] reviews the key technologies in the components of ZTA, and their application in real-world scenarios.…”
Section: Existing Surveysmentioning
confidence: 99%
“…Buck et al [17] analyzes the disadvantages and costs of ZTA from an economics and user perspective based on blockchain. Alevizos et al [4] also used blockchain to enhance the zero-trust architecture to the endpoint and reviewed state-of-the-art blockchain-based intrusion detection systems.…”
Section: Existing Surveysmentioning
confidence: 99%