Dhiman Poonam, Saini Neha, Gulzar Yonis, Turaev Sherzod, Kaur Amandeep, Nisa Khair Ul, Hamid Yasir
Government P.G. College, Idgah Road, Kabari Bazar, Ambala Cantt 133001, India.
Government College, Chhachhrauli, Yamuna Nagar 135103, India.
Sensors (Basel). 2024 Feb 19;24(4):1328. doi: 10.3390/s24041328.
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well as an assessment of the many strategies and possibilities for effective implementation. The survey begins by examining the role of authentication and access control within Zero Trust Architectures, and subsequently investigates innovative authentication, as well as access control solutions across different scenarios. It more deeply explores traditional techniques for encryption, micro-segmentation, and security automation, emphasizing their importance in achieving a secure Zero Trust environment. Zero Trust Architecture is explained in brief, along with the Taxonomy of Zero Trust Network Features. This review article provides useful insights into the Zero Trust paradigm, its approaches, problems, and future research objectives for scholars, practitioners, and policymakers. This survey contributes to the growth and implementation of secure network architectures in critical infrastructures by developing a deeper knowledge of Zero Trust.
零信任安全架构作为一种克服标准网络安全解决方案缺点的有趣方法而出现。这项广泛的调查研究对零信任的基本原理进行了细致的解释,并对有效实施的多种策略和可能性进行了评估。该调查首先审视了认证和访问控制在零信任架构中的作用,随后研究了创新认证以及不同场景下的访问控制解决方案。它更深入地探讨了加密、微分段和安全自动化的传统技术,强调了它们在实现安全的零信任环境中的重要性。简要解释了零信任架构以及零信任网络特征的分类法。这篇综述文章为学者、从业者和政策制定者提供了关于零信任范式、其方法、问题和未来研究目标的有用见解。这项调查通过加深对零信任的了解,为关键基础设施中安全网络架构的发展和实施做出了贡献。