Published April 30, 2018 | Version v1
Journal article Open

Zero Trust Architecture for Cloud Security

Authors/Creators

Description

The burgeoning landscape of cloud computing necessitates a reevaluation of traditional security models. Previously, the concept of a trusted network perimeter formed the bedrock of security, granting unfettered access to resources once inside the perimeter. However, the cloud-centric world demands a more robust approach. Zero Trust Architecture (ZTA) emerges as a compelling security framework, upholding the principle of “never trust, always verify." This paper delves into the core tenets of ZTA, exploring its advantages for cloud security and outlining practical considerations for implementation. By embracing ZTA principles and leveraging appropriate security tools, organizations can significantly bolster their cloud security posture and mitigate the ever-present threat of cyberattacks.

Files

JSAER2018-05-04-466-468.pdf

Files (153.5 kB)

Name Size Download all
md5:588df8e899297c15d265ee3377583f0d
153.5 kB Preview Download

Additional details

References