Zero trust model: A compelling strategy to strengthen the security posture of IT organizations

3Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Zero trusts refer to an emerging network protection paradigm, shifting network defenses from large network perimeters to concentrating specifically on users or limited resource classes. The Zero Trust Model (ZTM) speaks of giving no tacit trust to devices dependent on their physical or network position. This paper analyses the concepts and components of the Zero Trust Model and suitable elements from other existing security models that can be used in the design process for the security architecture. It attempts to bring toto the notice of IT Organizations the positive impact that adopting the the model will contribute. Authors have systematically analyzed the existing studies and research articles by eminent and through a series of structured interviews understood the real-time experiences and knowledge of senior-level security professionals of IT organizations on the model and present the same. IT organizations expected to make a rapid shift towards adopting ZTM shortly to gain maximum benefits in strengthening their security posture. They would gain substantially from this study.

Cite

CITATION STYLE

APA

Pavana, B., & Prasad, S. K. (2022). Zero trust model: A compelling strategy to strengthen the security posture of IT organizations. In AIP Conference Proceedings (Vol. 2519). American Institute of Physics Inc. https://doi.org/10.1063/5.0110649

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free