2023
DOI: 10.1007/978-3-031-09691-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Zero Trust Security Strategies and Guideline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…For businesses with several cloud environments, multiple linked systems, and a desire for more control over individual cloud access as well as cloud-based services and apps, a Zero Trust architecture is perfect [18,19]. Compared to traditional network security, which employed the "trust but verify" approach, zero trust stands for a significant change [20,21]. The implementation of this framework combines advanced technologies such as risk-based multi-factor authentication, identity protection, next-generation endpoint security, and robust cloud workload technology to verify a user or system's identity, consider access at that time, and keep system security [20].…”
Section: How Zero Trust Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For businesses with several cloud environments, multiple linked systems, and a desire for more control over individual cloud access as well as cloud-based services and apps, a Zero Trust architecture is perfect [18,19]. Compared to traditional network security, which employed the "trust but verify" approach, zero trust stands for a significant change [20,21]. The implementation of this framework combines advanced technologies such as risk-based multi-factor authentication, identity protection, next-generation endpoint security, and robust cloud workload technology to verify a user or system's identity, consider access at that time, and keep system security [20].…”
Section: How Zero Trust Workmentioning
confidence: 99%
“…The implementation of this framework combines advanced technologies such as risk-based multi-factor authentication, identity protection, next-generation endpoint security, and robust cloud workload technology to verify a user or system's identity, consider access at that time, and keep system security [20]. Zero Trust also demands data encryption, email security, and asset and endpoint cleanliness verification before connecting to applications [21]. Under Zero Trust architecture, organizations must thus constantly monitor and verify that an individual and their device (real-time validation) have the required privileges and attributes [22].…”
Section: How Zero Trust Workmentioning
confidence: 99%
“…Implementing a zero trust model, which strives to verify and authorize every device, app, and user attempting to access every resource (Ray, 2023). Reviewing and improving the security policies, procedures, and performance, using tools such as audits, tests, benchmarks, or feedback (Seaman, 2023). These are some of the common proactive cybersecurity measures, but there may be other specific or customized measures for each organization.…”
Section: Motivations For Iso 27001 Adoptionmentioning
confidence: 99%
“…Table 2 presents some of the emerging technologies for cloud security improvement. This is an approach that assumes no trust within or outside an organization's network perimeter [185]. Every user, device, and application are treated as untrusted until proven otherwise.…”
Section: Emerging Technologies and Future Trendsmentioning
confidence: 99%