A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES

To counter the decreased efficiency of the perimeter-based network model and due to the ease of cyber-attacks, zero trust security was introduced. Zero trust security is a security framework that does not trust any user, whether internal or external, and verifies each time a transaction is requested...

Full description

Saved in:
Bibliographic Details
Main Authors: Varun Varma Sangaraju, SV Achuta Rao, Amjan Shaik, Prasuna VG, Nagaraju P B S.R.K.R.
Format: Article
Language:English
Published: University of Kragujevac 2025-03-01
Series:Proceedings on Engineering Sciences
Subjects:
Online Access:https://pesjournal.net/journal/v7-n1/47.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To counter the decreased efficiency of the perimeter-based network model and due to the ease of cyber-attacks, zero trust security was introduced. Zero trust security is a security framework that does not trust any user, whether internal or external, and verifies each time a transaction is requested. This paper discusses the need for zero trust security in detail with some real-world examples. The robust and flexible architecture of zero-trust security is provided to build upon based on the needs of an organization. The research suggests that Multifactor Authentication (MFA) can be of great advantage when coupled with zero trust security for authentication purposes. The rise of quantum computers and data centers calls for new security measures like zero trust security. Implementing zero trust security on physical devices of such scale will be tough work. This paper reviews the recent application trends of zero trust security in various domains. This paper also identified major challenges in using zero trust security on an enterprise level.
ISSN:2620-2832
2683-4111