Proceedings of the 26th ACM Symposium on Access Control Models and Technologies 2021
DOI: 10.1145/3450569.3463558
|View full text |Cite
|
Sign up to set email alerts
|

Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing

Abstract: The zero trust principle only allows authorized and authenticated actions in a computer network. A network policy satisfies the least privilege principle by minimizing the network permissions to only those needed by users and applications. However, administrators face many challenges in creating a least privilege policy since it requires a detailed understanding of the network topology and knowing the communication requirements of every network application and user. This paper addresses those challenges by int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Based on the core idea of "never trust, always verify" [148], ZTA follows a resource-based security policy: no users, devices or applications (services) can access the data without authentication and authorization. However, while ZTA provides more robust cyber protection measures, it still faces significant implementation challenges [68]. The implementation of ZTA requires multiple security tools (e.g., firewalls) and policies to work together, and traditional stand-alone security detection approaches may not be applicable.…”
Section: Introductionmentioning
confidence: 99%
“…Based on the core idea of "never trust, always verify" [148], ZTA follows a resource-based security policy: no users, devices or applications (services) can access the data without authentication and authorization. However, while ZTA provides more robust cyber protection measures, it still faces significant implementation challenges [68]. The implementation of ZTA requires multiple security tools (e.g., firewalls) and policies to work together, and traditional stand-alone security detection approaches may not be applicable.…”
Section: Introductionmentioning
confidence: 99%