Publication:
Migrating to Zero Trust Architecture: Reviews and Challenges

dc.contributor.authorSongpon Teerakanoken_US
dc.contributor.authorTetsutaro Ueharaen_US
dc.contributor.authorAtsuo Inomataen_US
dc.contributor.otherRitsumeikan University Biwako-Kusatsu Campusen_US
dc.contributor.otherOsaka Universityen_US
dc.contributor.otherMahidol Universityen_US
dc.date.accessioned2022-08-04T08:28:58Z
dc.date.available2022-08-04T08:28:58Z
dc.date.issued2021-01-01en_US
dc.description.abstractZero trust (ZT) is a new concept involving the provisioning of enterprise/organization resources to the subjects without relying on any implicit trust. Unlike the perimeter-based architecture in which any subject behind the wall (i.e., inside the predefined perimeter) is considered trusted, zero trust architecture (ZTA) processes any request and provides a resource to the subject without relying on implicit trust. In this paper, based on NIST Special Publication SP800-207, the concept of ZT and ZTA is introduced. Also, challenges, steps, and things to consider when migrating from the legacy architecture to ZTA are presented and discussed.en_US
dc.identifier.citationSecurity and Communication Networks. Vol.2021, (2021)en_US
dc.identifier.doi10.1155/2021/9947347en_US
dc.identifier.issn19390122en_US
dc.identifier.issn19390114en_US
dc.identifier.other2-s2.0-85107648295en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/76743
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85107648295&origin=inwarden_US
dc.subjectComputer Scienceen_US
dc.titleMigrating to Zero Trust Architecture: Reviews and Challengesen_US
dc.typeReviewen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85107648295&origin=inwarden_US

Files

Collections