Zero trust implementation in the emerging technologies era: a survey

Abraham Itzhak Weinberg, Kelly Cohen

Research output: Contribution to journalArticlepeer-review

Abstract

This paper presents a comprehensive analysis of the shift from the traditional perimeter model of security to the Zero Trust (ZT) framework, emphasizing the key points in the transition and the practical application of ZT. It outlines the differences between ZT policies and legacy security policies, along with the significant events that have impacted the evolution of ZT. Additionally, the paper explores the potential impacts of emerging technologies, such as Artificial Intelligence and quantum computing, on the policy and implementation of ZT. The study thoroughly examines how Artificial Intelligence can enhance ZT by utilizing Machine Learning algorithms to analyze patterns, detect anomalies, and predict threats, thereby improving real-time decision-making processes. Furthermore, the paper demonstrates how a chaos theory-based approach, in conjunction with other technologies such as eXtended Detection and Re-sponse, can effectively mitigate cyberattacks. As quantum computing presents new challenges to ZT and cyberse-curity as a whole, the paper delves into the intricacies of ZT migration, automation, and orchestration, addressing the complexities associated with these aspects. Finally, the paper provides a best practice approach for the seamless implementation of ZT in organizations, laying out the proposed guidelines to facilitate organizations in their transition towards a more secure ZT model. The study aims to support organizations in successfully implementing ZT and enhancing their cybersecurity measures.

Original languageEnglish
Article number16
JournalComplex Engineering Systems
Volume4
Issue number3
DOIs
StatePublished - Sep 2024
Externally publishedYes

Bibliographical note

Publisher Copyright:
© The Author(s) 2024.

Keywords

  • Zero trust
  • artificial intelligence (AI)
  • chaos theory
  • eXtended detection and response (XDR)
  • policy
  • quantum computing

Fingerprint

Dive into the research topics of 'Zero trust implementation in the emerging technologies era: a survey'. Together they form a unique fingerprint.

Cite this