Abstract
This paper presents a comprehensive analysis of the shift from the traditional perimeter model of security to the Zero Trust (ZT) framework, emphasizing the key points in the transition and the practical application of ZT. It outlines the differences between ZT policies and legacy security policies, along with the significant events that have impacted the evolution of ZT. Additionally, the paper explores the potential impacts of emerging technologies, such as Artificial Intelligence and quantum computing, on the policy and implementation of ZT. The study thoroughly examines how Artificial Intelligence can enhance ZT by utilizing Machine Learning algorithms to analyze patterns, detect anomalies, and predict threats, thereby improving real-time decision-making processes. Furthermore, the paper demonstrates how a chaos theory-based approach, in conjunction with other technologies such as eXtended Detection and Re-sponse, can effectively mitigate cyberattacks. As quantum computing presents new challenges to ZT and cyberse-curity as a whole, the paper delves into the intricacies of ZT migration, automation, and orchestration, addressing the complexities associated with these aspects. Finally, the paper provides a best practice approach for the seamless implementation of ZT in organizations, laying out the proposed guidelines to facilitate organizations in their transition towards a more secure ZT model. The study aims to support organizations in successfully implementing ZT and enhancing their cybersecurity measures.
Original language | English |
---|---|
Article number | 16 |
Journal | Complex Engineering Systems |
Volume | 4 |
Issue number | 3 |
DOIs | |
State | Published - Sep 2024 |
Externally published | Yes |
Bibliographical note
Publisher Copyright:© The Author(s) 2024.
Keywords
- Zero trust
- artificial intelligence (AI)
- chaos theory
- eXtended detection and response (XDR)
- policy
- quantum computing