ZERO-TRUST ARCHITECTURE: A PARADIGM SHIFT IN SECURING THE MODERN ENTERPRISE
Keywords:
cybersecurity, network, risk, IT infrastructureAbstract
The landscape of cybersecurity has undergone a profound transformation in recent years as organizations grapple with increasingly sophisticated and persistent cyber threats. Traditional security models, which rely heavily on perimeter defenses, have proven insufficient in protecting the modern enterprise. This has led to a growing adoption of zero-trust architecture, a fundamentally different approach to security that challenges the conventional trust-based assumptions of network protection. Zero-trust architecture operates on the principle that no user or device, whether inside or outside the network, should be trusted by default. Instead, every access request is rigorously verified, and strict access controls are enforced throughout the network.
References
Gartner. (2022). Zero Trust in Practice: Building a Comprehensive Security Model for Modern Enterprises. Retrieved from https://www.gartner.com/
National Institute of Standards and Technology (NIST). (2021). Zero Trust Architecture: NIST Special Publication 800-207. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-207/final
Forrester Research. (2022). The Zero Trust Security Playbook: Strategies for Protecting Your Enterprise. Retrieved from https://www.forrester.com/
Okta. (2022). Identity and Access Management in Zero Trust: Best Practices and Challenges. Retrieved from https://www.okta.com/
Zscaler. (2021). Navigating the Zero Trust Journey: A Guide to Integrating Zero Trust with Existing Infrastructure. Retrieved from https://www.zscaler.com/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.