Zero Trust Architecture (ZTA): A Comprehensive Survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. The article employs a descriptive approach to present the fundamental tenets of ZT and provides a review of numerous potential options a...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9773102/ |
_version_ | 1818206754097332224 |
---|---|
author | Naeem Firdous Syed Syed W. Shah Arash Shaghaghi Adnan Anwar Zubair Baig Robin Doss |
author_facet | Naeem Firdous Syed Syed W. Shah Arash Shaghaghi Adnan Anwar Zubair Baig Robin Doss |
author_sort | Naeem Firdous Syed |
collection | DOAJ |
description | We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. The article employs a descriptive approach to present the fundamental tenets of ZT and provides a review of numerous potential options available for successful realization of this paradigm. We describe the role of authentication and access control in Zero Trust Architectures (ZTA) and present an in-depth discussion of state-of-the-art techniques for authentication and access control in different scenarios. Furthermore, we comprehensively discuss the conventional approaches to encryption, micro-segmentation, and security automation available for instantiating a ZTA. The article also details various challenges associated with contemporary authentication mechanisms, access control schemes, trust and risk computation techniques, micro-segmentation approaches, and Software-Defined Perimeter, that can impact the implementation of ZT in its true sense. Based upon our analysis, we finally pinpoint the potential future research directions for successful realization of ZT in critical infrastructures. |
first_indexed | 2024-12-12T04:18:03Z |
format | Article |
id | doaj.art-431390b698d84859b2c2979ee732804d |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-12T04:18:03Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-431390b698d84859b2c2979ee732804d2022-12-22T00:38:23ZengIEEEIEEE Access2169-35362022-01-0110571435717910.1109/ACCESS.2022.31746799773102Zero Trust Architecture (ZTA): A Comprehensive SurveyNaeem Firdous Syed0https://orcid.org/0000-0003-2450-4337Syed W. Shah1Arash Shaghaghi2https://orcid.org/0000-0001-6630-9519Adnan Anwar3https://orcid.org/0000-0003-0070-182XZubair Baig4https://orcid.org/0000-0002-9245-2703Robin Doss5https://orcid.org/0000-0001-6143-6850Centre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaWe present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. The article employs a descriptive approach to present the fundamental tenets of ZT and provides a review of numerous potential options available for successful realization of this paradigm. We describe the role of authentication and access control in Zero Trust Architectures (ZTA) and present an in-depth discussion of state-of-the-art techniques for authentication and access control in different scenarios. Furthermore, we comprehensively discuss the conventional approaches to encryption, micro-segmentation, and security automation available for instantiating a ZTA. The article also details various challenges associated with contemporary authentication mechanisms, access control schemes, trust and risk computation techniques, micro-segmentation approaches, and Software-Defined Perimeter, that can impact the implementation of ZT in its true sense. Based upon our analysis, we finally pinpoint the potential future research directions for successful realization of ZT in critical infrastructures.https://ieeexplore.ieee.org/document/9773102/Zero trust architecture (ZTA)access controlauthenticationmicro-segmentationsoftware-defined parameter (SDP) |
spellingShingle | Naeem Firdous Syed Syed W. Shah Arash Shaghaghi Adnan Anwar Zubair Baig Robin Doss Zero Trust Architecture (ZTA): A Comprehensive Survey IEEE Access Zero trust architecture (ZTA) access control authentication micro-segmentation software-defined parameter (SDP) |
title | Zero Trust Architecture (ZTA): A Comprehensive Survey |
title_full | Zero Trust Architecture (ZTA): A Comprehensive Survey |
title_fullStr | Zero Trust Architecture (ZTA): A Comprehensive Survey |
title_full_unstemmed | Zero Trust Architecture (ZTA): A Comprehensive Survey |
title_short | Zero Trust Architecture (ZTA): A Comprehensive Survey |
title_sort | zero trust architecture zta a comprehensive survey |
topic | Zero trust architecture (ZTA) access control authentication micro-segmentation software-defined parameter (SDP) |
url | https://ieeexplore.ieee.org/document/9773102/ |
work_keys_str_mv | AT naeemfirdoussyed zerotrustarchitectureztaacomprehensivesurvey AT syedwshah zerotrustarchitectureztaacomprehensivesurvey AT arashshaghaghi zerotrustarchitectureztaacomprehensivesurvey AT adnananwar zerotrustarchitectureztaacomprehensivesurvey AT zubairbaig zerotrustarchitectureztaacomprehensivesurvey AT robindoss zerotrustarchitectureztaacomprehensivesurvey |