Deakin University
Browse

Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges

Version 2 2024-05-30, 23:21
Version 1 2024-02-07, 04:12
journal contribution
posted on 2024-05-30, 23:21 authored by Yang Cao, Shiva PokhrelShiva Pokhrel, Ye ZhuYe Zhu, Robin Ram Mohan DossRobin Ram Mohan Doss, Gang LiGang Li
AbstractZero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and access resources. ZTA is non-perimeter-based defence, which has been emerging as a promising revolution in the cyber security field. It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system. However, ZTA automation and orchestration, towards seamless deployment on real-world networks, has been limited to be reviewed in the existing literature. In this paper, we first identify the bottlenecks, discuss the background of ZTA and compare it with traditional perimeter-based security architectures. More importantly, we provide an in-depth analysis of state-of-the-art AI techniques that have the potential in the automation and orchestration of ZTA. Overall, in this review paper, we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA.

History

Journal

Machine Intelligence Research

Volume

21

Pagination

294-317

Location

Berlin, Germany

ISSN

2731-538X

eISSN

2731-5398

Language

eng

Publication classification

C1 Refereed article in a scholarly journal

Issue

2

Publisher

Springer