A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model.

Sensors (Basel)

Information Security and Engineering Technology, AbuDhabi Polytechnic College, Abu Dhabi 111499, United Arab Emirates.

Published: February 2024

AI Article Synopsis

  • - The Zero Trust safety architecture aims to address the limitations of traditional network security by focusing on stringent authentication and access control measures.
  • - The study provides a thorough examination of Zero Trust principles, as well as innovative authentication methods and traditional security techniques like encryption and micro-segmentation.
  • - Ultimately, the survey offers valuable insights and outlines future research goals, aiding scholars, practitioners, and policymakers in enhancing secure network architectures in essential infrastructures.

Article Abstract

The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well as an assessment of the many strategies and possibilities for effective implementation. The survey begins by examining the role of authentication and access control within Zero Trust Architectures, and subsequently investigates innovative authentication, as well as access control solutions across different scenarios. It more deeply explores traditional techniques for encryption, micro-segmentation, and security automation, emphasizing their importance in achieving a secure Zero Trust environment. Zero Trust Architecture is explained in brief, along with the Taxonomy of Zero Trust Network Features. This review article provides useful insights into the Zero Trust paradigm, its approaches, problems, and future research objectives for scholars, practitioners, and policymakers. This survey contributes to the growth and implementation of secure network architectures in critical infrastructures by developing a deeper knowledge of Zero Trust.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10892953PMC
http://dx.doi.org/10.3390/s24041328DOI Listing

Publication Analysis

Top Keywords

trust
9
trust network
8
access control
8
review comparative
4
comparative analysis
4
analysis relevant
4
relevant approaches
4
approaches trust
4
network
4
network model
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!