2022
DOI: 10.1155/2022/7026779
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Context and Risk Aware Access Control for Zero Trust Systems

Abstract: Evolving computing technologies such as cloud, edge computing, and the Internet of Things (IoT) are creating a more complex, dispersed, and dynamic enterprise operational environment. New security enterprise architectures such as those based on the concept of Zero Trust (ZT) are emerging to meet the challenges posed by these changes. ZT systems treat internal and external networks as untrusted and subject both to the same security checking and control to prevent data breaches and limit internal lateral movemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 84 publications
0
2
0
Order By: Relevance
“…The concept of zero trust security originated with the work of the Jericho Forum, a security consortium, in 2003 (Al-Ruwaii and De moura 2021). However, the term "zero trust" was officially coined by Forrester in 2010 (Kindervag and Balaouras 2010) and has since matured, gaining widespread recognition in the industry (Xiao et al 2022). In the zero trust model, trust is not given blindly to entities seeking access to network resources, even after undergoing initial authentication and authorization (Ramezanpour and Jagannath 2022).…”
Section: Conceptual Background Of Zero Trustmentioning
confidence: 99%
“…The concept of zero trust security originated with the work of the Jericho Forum, a security consortium, in 2003 (Al-Ruwaii and De moura 2021). However, the term "zero trust" was officially coined by Forrester in 2010 (Kindervag and Balaouras 2010) and has since matured, gaining widespread recognition in the industry (Xiao et al 2022). In the zero trust model, trust is not given blindly to entities seeking access to network resources, even after undergoing initial authentication and authorization (Ramezanpour and Jagannath 2022).…”
Section: Conceptual Background Of Zero Trustmentioning
confidence: 99%
“…Incorporating these components into the smart grid contributes to creating more complex, distributed, and dynamic operating environments. To meet the challenges posed by these changes, new enterprise security architectures are emerging, for example, based on the concept of Zero Trust (ZT) as defined by the team around S. Xiao in their paper [ 13 ] “SoK: Context and Risk Aware Access Control for Zero Trust Systems”. ZT systems then consider internal and external networks as untrusted, and both are subject to the same security controls and management to prevent data breaches and limit internal lateral movement.…”
Section: Cyber Security In Substation Automation Systemsmentioning
confidence: 99%
“…The principle states, "Never trust; always verify" [2]. This model is a holistic approach to protecting data and resources and does not represent a single product or technology [3]. It is a modern approach to network security that challenges the traditional notion of the inherent trustworthiness of users and devices.…”
Section: Introductionmentioning
confidence: 99%