Zero Trust Architecture (ZTA): A Comprehensive Survey

We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. The article employs a descriptive approach to present the fundamental tenets of ZT and provides a review of numerous potential options a...

Full description

Bibliographic Details
Main Authors: Naeem Firdous Syed, Syed W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9773102/
_version_ 1818206754097332224
author Naeem Firdous Syed
Syed W. Shah
Arash Shaghaghi
Adnan Anwar
Zubair Baig
Robin Doss
author_facet Naeem Firdous Syed
Syed W. Shah
Arash Shaghaghi
Adnan Anwar
Zubair Baig
Robin Doss
author_sort Naeem Firdous Syed
collection DOAJ
description We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. The article employs a descriptive approach to present the fundamental tenets of ZT and provides a review of numerous potential options available for successful realization of this paradigm. We describe the role of authentication and access control in Zero Trust Architectures (ZTA) and present an in-depth discussion of state-of-the-art techniques for authentication and access control in different scenarios. Furthermore, we comprehensively discuss the conventional approaches to encryption, micro-segmentation, and security automation available for instantiating a ZTA. The article also details various challenges associated with contemporary authentication mechanisms, access control schemes, trust and risk computation techniques, micro-segmentation approaches, and Software-Defined Perimeter, that can impact the implementation of ZT in its true sense. Based upon our analysis, we finally pinpoint the potential future research directions for successful realization of ZT in critical infrastructures.
first_indexed 2024-12-12T04:18:03Z
format Article
id doaj.art-431390b698d84859b2c2979ee732804d
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-12T04:18:03Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-431390b698d84859b2c2979ee732804d2022-12-22T00:38:23ZengIEEEIEEE Access2169-35362022-01-0110571435717910.1109/ACCESS.2022.31746799773102Zero Trust Architecture (ZTA): A Comprehensive SurveyNaeem Firdous Syed0https://orcid.org/0000-0003-2450-4337Syed W. Shah1Arash Shaghaghi2https://orcid.org/0000-0001-6630-9519Adnan Anwar3https://orcid.org/0000-0003-0070-182XZubair Baig4https://orcid.org/0000-0002-9245-2703Robin Doss5https://orcid.org/0000-0001-6143-6850Centre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaCentre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC, AustraliaWe present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. The article employs a descriptive approach to present the fundamental tenets of ZT and provides a review of numerous potential options available for successful realization of this paradigm. We describe the role of authentication and access control in Zero Trust Architectures (ZTA) and present an in-depth discussion of state-of-the-art techniques for authentication and access control in different scenarios. Furthermore, we comprehensively discuss the conventional approaches to encryption, micro-segmentation, and security automation available for instantiating a ZTA. The article also details various challenges associated with contemporary authentication mechanisms, access control schemes, trust and risk computation techniques, micro-segmentation approaches, and Software-Defined Perimeter, that can impact the implementation of ZT in its true sense. Based upon our analysis, we finally pinpoint the potential future research directions for successful realization of ZT in critical infrastructures.https://ieeexplore.ieee.org/document/9773102/Zero trust architecture (ZTA)access controlauthenticationmicro-segmentationsoftware-defined parameter (SDP)
spellingShingle Naeem Firdous Syed
Syed W. Shah
Arash Shaghaghi
Adnan Anwar
Zubair Baig
Robin Doss
Zero Trust Architecture (ZTA): A Comprehensive Survey
IEEE Access
Zero trust architecture (ZTA)
access control
authentication
micro-segmentation
software-defined parameter (SDP)
title Zero Trust Architecture (ZTA): A Comprehensive Survey
title_full Zero Trust Architecture (ZTA): A Comprehensive Survey
title_fullStr Zero Trust Architecture (ZTA): A Comprehensive Survey
title_full_unstemmed Zero Trust Architecture (ZTA): A Comprehensive Survey
title_short Zero Trust Architecture (ZTA): A Comprehensive Survey
title_sort zero trust architecture zta a comprehensive survey
topic Zero trust architecture (ZTA)
access control
authentication
micro-segmentation
software-defined parameter (SDP)
url https://ieeexplore.ieee.org/document/9773102/
work_keys_str_mv AT naeemfirdoussyed zerotrustarchitectureztaacomprehensivesurvey
AT syedwshah zerotrustarchitectureztaacomprehensivesurvey
AT arashshaghaghi zerotrustarchitectureztaacomprehensivesurvey
AT adnananwar zerotrustarchitectureztaacomprehensivesurvey
AT zubairbaig zerotrustarchitectureztaacomprehensivesurvey
AT robindoss zerotrustarchitectureztaacomprehensivesurvey