2021
DOI: 10.1155/2021/9947347
|View full text |Cite
|
Sign up to set email alerts
|

Migrating to Zero Trust Architecture: Reviews and Challenges

Abstract: Zero trust (ZT) is a new concept involving the provisioning of enterprise/organization resources to the subjects without relying on any implicit trust. Unlike the perimeter-based architecture in which any subject behind the wall (i.e., inside the predefined perimeter) is considered trusted, zero trust architecture (ZTA) processes any request and provides a resource to the subject without relying on implicit trust. In this paper, based on NIST Special Publication SP800-207, the concept of ZT and ZTA is introduc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(30 citation statements)
references
References 8 publications
0
23
0
1
Order By: Relevance
“…In heterogeneous environments like MEC, the infrastructure needs to examine the pertinent aspects of access requests instead of assuming trust based on a point-in-time assurance, that is, admission control or network location. Trust management for MEC introduces challenges as identified in [7,[26][27][28][29]. In the ZTS approach, the security posture of applications, users, and UE [11,24] will be continually reassessed.…”
Section: Zero-trust Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In heterogeneous environments like MEC, the infrastructure needs to examine the pertinent aspects of access requests instead of assuming trust based on a point-in-time assurance, that is, admission control or network location. Trust management for MEC introduces challenges as identified in [7,[26][27][28][29]. In the ZTS approach, the security posture of applications, users, and UE [11,24] will be continually reassessed.…”
Section: Zero-trust Securitymentioning
confidence: 99%
“…Adversaries know that the MEC environment has multiple entry points through the functional layers [2]. Adopting the ZTS fundamentals would implement various security controls across the MEC ecosystem lifecycle to continuously verify trust [29]. Security controls would collaborate and constantly feed the ZTS enablers to maintain visibility across the known threats and become aware of emerging vulnerabilities.…”
Section: Securing the Trust Pillarsmentioning
confidence: 99%
“…O trabalho [Teerakanok et al 2021] aborda a migrac ¸ão da arquitetura baseada em perímetro para a arquitetura de confianc ¸a zero, propondo um processo de migrac ¸ão em três etapas: avaliac ¸ão dos usuários e ambiente computacional; avaliac ¸ão de risco; e implantac ¸ão e revisão. O nosso trabalho aborda as três etapas ao propor e instanciar uma arquitetura baseada em tecnologias comerciais aplicadas ao ambiente de big data real.…”
Section: Trabalhos Relacionadosunclassified
“…He also explains how zero-trust security can have an impact on network and security system integration. The existing surveys focus on basic concepts of ZTA [151], migration strategies [134],…”
Section: Existing Surveysmentioning
confidence: 99%
“…The advantages of ZTA and the existing challenges are also presented. Teerakanok et al [134] investigates the challenges, steps, and matters to be considered in migrating from a legacy architecture to ZTA.…”
Section: Existing Surveysmentioning
confidence: 99%