Theory and Application of Zero Trust Security: A Brief Survey

Entropy (Basel). 2023 Nov 28;25(12):1595. doi: 10.3390/e25121595.

Abstract

As cross-border access becomes more frequent, traditional perimeter-based network security models can no longer cope with evolving security requirements. Zero trust is a novel paradigm for cybersecurity based on the core concept of "never trust, always verify". It attempts to protect against security risks related to internal threats by eliminating the demarcations between the internal and external network of traditional network perimeters. Nevertheless, research on the theory and application of zero trust is still in its infancy, and more extensive research is necessary to facilitate a deeper understanding of the paradigm in academia and the industry. In this paper, trust in cybersecurity is discussed, following which the origin, concepts, and principles related to zero trust are elaborated on. The characteristics, strengths, and weaknesses of the existing research are analysed in the context of zero trust achievements and their technical applications in Cloud and IoT environments. Finally, to support the development and application of zero trust in the future, the concept and its current challenges are analysed.

Keywords: cloud computing; internet of things; network security; zero trust.

Publication types

  • Review

Grants and funding

This work was supported in part by the Shaanxi Key R&D Program (Grant 375 No. 2019ZDLGY13-01), and Natural Science Basic Research Plan in Shaanxi Province of China (No. 2022JZ-40).