首页|Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges

Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges

扫码查看
Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access resources.ZTA is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security field.It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system.However,ZTA automation and orchestration,towards seamless deployment on real-world networks,has been limited to be reviewed in the existing literature.In this pa-per,we first identify the bottlenecks,discuss the background of ZTA and compare it with traditional perimeter-based security architec-tures.More importantly,we provide an in-depth analysis of state-of-the-art AI techniques that have the potential in the automation and orchestration of ZTA.Overall,in this review paper,we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA.

Zero trust architecturecyber securityartificial intelligenceaccess controlauthentication

Yang Cao、Shiva Raj Pokhrel、Ye Zhu、Robin Doss、Gang Li

展开 >

Centre for Cyber Resilience and Trust,Deakin University,Burwood 3125,Australia

School of Information Technology,Deakin University,Geelong 3216,Australia

Open Access funding enabled and organized by CAUL and its Member Institutions

2024

机器智能研究(英文)
中国科学院自动化所

机器智能研究(英文)

CSTPCDEI
影响因子:0.49
ISSN:2731-538X
年,卷(期):2024.21(2)
  • 171