Zero trust architecture: the basics organization principles

DOI: 10.31673/2412-9070.2022.051620

  • Придибайло О. Б. (Prydybailo O. B.) State University of Telecommunications, Kyiv
  • Срібна І. М. (Sribna I. M.) State University of Telecommunications, Kyiv
  • Придибайло Р. В. (Prydybailo R. V.) State University of Telecommunications, Kyiv

Abstract

Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. Zero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloudbased assets that are not located within an enterpriseowned network boundary. Zero trust focuses on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. This document contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprise’s overall information technology security posture.
This article describes zero trust for enterprise security architects. It is designed to help understand zero trust for civilian unclassified systems and provide a roadmap for the migration and deployment of zero trust security concepts in an enterprise environment. Starting with a clear understanding of the organization’s business and data can lead to a strong zero-trust approach for enterprise security architects.

Keywords: architecture; cybersecurity; enterprise; network security; zero trust; zero trust architecturе.

References
1. Liu Q. Data center security protection in the industry based on zero-trust architecture // Security & Informatization. 2018. 12. Р. 107–109.
2. Yang Z., Jin M., Zhang X. Research on Security Technology of Zero Trust in Cloud Business // Information Security and Communications Privacy. 2020. 3. Р. 91–98.
3. Zuo Y. Zero-trust architecture: a new paradigm for network security // Financial Computerizing. 2018. 11. Р. 50–51.
4. Zeng H. Discussion on Network Security Model and Zerotrust Practice // Computer Products and Circulation. 2020. 7. Р. 48.
5. Zhong X., Guo W., Ma Y., Wang M. Airport Network Security Protection Scheme Based on Zero Trust Security Architecture // Journal of Civil Aviation, 2019. 3(03). Р. 114–116+107.

Section
Articles