Redefining the Network Security with Zero Trust Model

Authors

  • Ajay D. Sirsat
  • Vandana Navale

Keywords:

Least privileged access, Micro segmentation, Network Security, Policy decision point, Zero-trust model, Zero-trust, ZTA,

Abstract

The fundamental problem in information security today is trust. Changing our trust model will change our networks and make them easier to build, maintain, and secure while making them more efficient, compliant, and cost-effective. According to the rule of law, all accused are deemed innocent until proven guilty, but Zero Trust security is not the case. The increased uncertainty created by such dynamicity adds to the access control process, highlighting the need for risk-based access control decision-making. As a result, the "zero-trust model" is gradually replacing the old perimeter-based security paradigm (ZTM). "How can you safeguard systems, services, applications, and data that can be accessed anywhere, anytime, by any user using any device, on an organizational network and in the cloud?" is the most basic security problem that zero trust network access aims to answer. In this work, we present a conceptual idea of a zero-trust security model. The study will also examine the pros and cons of the zero trust model in comparison to other network models and examine possible use cases of the model.

Published

2022-03-28