Zero trust in modern information systems: concept, challenges, and implementation
Анотації
В умовах зростаючих кіберзагроз та дедалі більш розмитих меж корпоративних мереж, модель інформаційної безпеки Zero Trust стає парадигмальним зрушенням у захисті інформаційних систем. Zero In an era of escalating cyber threats and increasingly porous network boundaries, the Zero Trust security model has emerged as a paradigm shift in protecting information systems. Zero Trust operates on the principle of “never trust, always verify,” assuming that no user or device is trustworthy by default – even those inside the traditional network perimeter. This paper provides a concise overview of Zero Trust, discussing its conceptual foundations and core principles, the challenges organizations face in adopting this model, and practical strategies for implementation. We review the origins of Zero Trust in response to the failures of perimeter-centric security, outline key tenets such as continuous verification and least-privilege access, and examine common hurdles like device proliferation, user experience concerns, and legacy system integration.
URI:
https://ir.lib.vntu.edu.ua//handle/123456789/49121