Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Review of zero trust network and its key technologies
Qun WANG, Quan YUAN, Fujuan LI, Lingling XIA
Journal of Computer Applications    2023, 43 (4): 1142-1150.   DOI: 10.11772/j.issn.1001-9081.2022030453
Abstract624)   HTML43)    PDF (2001KB)(480)       Save

With increasingly severe network security threats and increasingly complex security defense means, zero trust network is a new evaluation and review of traditional boundary security architecture. Zero trust emphasizes never always trusting anything and verifying things continuously. Zero trust network emphasizes that the identity is not identified by location, all access controls strictly execute minimum permissions, and all access processes are tracked in real time and evaluated dynamically. Firstly, the basic definition of zero trust network was given, the main problems of traditional perimeter security were pointed out, and the zero trust network model was described. Secondly, the key technologies of zero trust network, such as Software Defined Perimeter (SDP), identity and access management, micro segmentation and Automated Configuration Management System (ACMS), were analyzed. Finally, zero trust network was summarized and its future development was prospected.

Table and Figures | Reference | Related Articles | Metrics