A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES
To counter the decreased efficiency of the perimeter-based network model and due to the ease of cyber-attacks, zero trust security was introduced. Zero trust security is a security framework that does not trust any user, whether internal or external, and verifies each time a transaction is requested...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Kragujevac
2025-03-01
|
| Series: | Proceedings on Engineering Sciences |
| Subjects: | |
| Online Access: | https://pesjournal.net/journal/v7-n1/47.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | To counter the decreased efficiency of the perimeter-based network model and due to the ease of cyber-attacks, zero trust security was introduced. Zero trust security is a security framework that does not trust any user, whether internal or external, and verifies each time a transaction is requested. This paper discusses the need for zero trust security in detail with some real-world examples. The robust and flexible architecture of zero-trust security is provided to build upon based on the needs of an organization. The research suggests that Multifactor Authentication (MFA) can be of great advantage when coupled with zero trust security for authentication purposes. The rise of quantum computers and data centers calls for new security measures like zero trust security. Implementing zero trust security on physical devices of such scale will be tough work. This paper reviews the recent application trends of zero trust security in various domains. This paper also identified major challenges in using zero trust security on an enterprise level. |
|---|---|
| ISSN: | 2620-2832 2683-4111 |