Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enforce strict identity verification and access rules across the cl...
Saved in:
| Main Authors: | Vedran Dakić, Zlatan Morić, Ana Kapulica, Damir Regvart |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-12-01
|
| Series: | Journal of Cybersecurity and Privacy |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2624-800X/5/1/2 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Autonomous identity-based threat segmentation for zero trust architecture
by: Sina Ahmadi
Published: (2025-12-01) -
Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
by: Mohammed El-Hajj
Published: (2025-05-01) -
Grain Growth Behavior of Alumina in Zirconia-Toughened Alumina (ZTA) Ceramics During Pressureless Sintering
by: Yi Zhao, et al.
Published: (2025-01-01) -
Advancing Cybersecurity with Honeypots and Deception Strategies
by: Zlatan Morić, et al.
Published: (2025-01-01) -
A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES
by: Varun Varma Sangaraju, et al.
Published: (2025-03-01)