As a promising tool to cope with the current phishing attacks, zero-trust is gradually being taken seriously while the situation of network security becoming more and more severe. In zero trust, no unit is fully trusted even if it passes the certification. They only have the least privilege, access to data requires authentication, these processes need to be logged. This paper performs a typical survey of the composition and key technologies of zero trust, and combines the application of this technology in some scenarios to introduce the advantages of zero trust, such as big data function, cloud network and IoT. Moreover, this paper also discusses some of the challenging research issues in the field that can provide ideas for future researchers.
CITATION STYLE
Yan, X., & Wang, H. (2020). Survey on Zero-Trust Network Security. In Communications in Computer and Information Science (Vol. 1252 CCIS, pp. 50–60). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-8083-3_5
Mendeley helps you to discover research relevant for your work.