Zero-Trust Security Models Overview

Authors

  • Keshav Jena  School of Computer Science, MIT World Peace University, Pune, Maharashtra, India

DOI:

https://doi.org/10.32628/CSEIT2390578

Keywords:

Architecture; Cybersecurity; Enterprise; Network security; zero trust.

Abstract

In an era of increasing cyber threats and data breaches, traditional security models that rely on trust-based access control are proving inadequate. Zero-Trust Security Models, which operate on the principle of "never trust, always verify," have gained prominence as a novel approach to fortifying digital defenses. This research paper offers a comprehensive overview of Zero-Trust Security Models, exploring their historical context, fundamental principles, implementation strategies, and real-world applications. By examining case studies and industry examples, it demonstrates how Zero-Trust can effectively enhance cybersecurity in today's dynamic threat landscape. This paper serves as a valuable resource for understanding and adopting Zero-Trust Security Models to bolster organizational security and protect against modern cyber threats.

References

  1. National Institute of Standards and Technology (NIST). (2020). NIST Special Publication 800-207: Zero Trust Architecture.Available:https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf.
  2. David Holmes, “The Definition Of Modern Zero Trust“, Forrester, 24 January 2022. [Online]. Available: https://www.forrester.com/blogs/the-definition-of-modern-zero-trust/.
  3. Jim Hietala,”Zero-trust architecture: Why trusting no one is a smart way to protect your IT infrastructure”, Redhat, 5 December 2022. [Online]. Available: https://www.redhat.com/architect/zero-trust-architecture.
  4. David Holmes, “Decoding The New Zero Trust Terminology”, Forrester, 27 April 2023. [Online]. Available:https://www.forrester.com/blogs/decoding-the-new-zero-trust-terminology/.
  5. Caroline Arakelian, Peter Bjork, Graeme Gordon, Andreano Lanusse, Hilko Lantinga, “Zero Trust Secure Access to Traditional Applications with VMware”, VMware, 15 August 2022. [Online]. Available: https://techzone.vmware.com/resource/zero-trust-secure-access-traditional-applications-vmware#introduction-what-is-zero-trust.
  6. Paul Toal, Krithiga Gopalan, “Approaching Zero Trust Security with Oracle Cloud Infrastructure”, Oracle,, July2022, Available: https://www.oracle.com/in/a/ocom/docs/whitepaper-zero-trust-security-oci.pdf.
  7. Microsoft, “Evolving Zero Trust”, [Online]. Available: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWJJdT.
  8. Rick Merritt, “What Is Zero Trust?”, Nvidia, 7 June 2022. Available: https://blogs.nvidia.com/blog/2022/06/07/what-is-zero-trust/.
  9. Google, “BeyondCorp”, Available: https://cloud.google.com/beyondcorp.

Downloads

Published

2023-12-30

Issue

Section

Research Articles

How to Cite

[1]
Keshav Jena, " Zero-Trust Security Models Overview" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 6, pp.70-76, November-December-2023. Available at doi : https://doi.org/10.32628/CSEIT2390578