THE AFTER-CONFERENCE PROCEEDING OF THE AIC 2024 WILL BE SUBMITTED FOR INCLUSION TO IEEE XPLORE

Mr. DHARNISHA NARASAPPA

Mr. DHARNISHA NARASAPPA

Cybersecurity - Zero-Trust Architecture (ZTA)

Abstract:-

Architecting and implementing a Zero-Trust Architecture (ZTA) for Enterprise and IoT environments addresses the evolving Cybersecurity landscape and the inherent limitations of traditional network security models. Unlike conventional perimeter-based security approaches that rely on static defenses such as firewalls and VPNs, ZTA adopts a dynamic, identity-centric strategy grounded in the principle of least privilege access.

Zero-Trust operates under the core assumption of "never trust, always verify," ensuring that no entity—whether inside or outside the network—is automatically granted access. By continuously validating identities, enforcing granular access controls, and monitoring user and device behavior, ZTA mitigates risks associated with lateral movement, unauthorized access, and insider threats.

This proactive security model shifts the focus from network location to identity, device posture, and contextual access requirements, strengthening security postures and minimizing attack surfaces across enterprise and IoT ecosystems.

Architecting and implementing a Zero-Trust Architecture (ZTA) for Enterprise and IoT environments addresses the evolving Cybersecurity landscape and the inherent limitations of traditional network security models. Unlike conventional perimeter-based security approaches that rely on static defenses such as firewalls and VPNs, ZTA adopts a dynamic, identity-centric strategy grounded in the principle of least privilege access.

Zero-Trust operates under the core assumption of "never trust, always verify," ensuring that no entity—whether inside or outside the network—is automatically granted access. By continuously validating identities, enforcing granular access controls, and monitoring user and device behavior, ZTA mitigates risks associated with lateral movement, unauthorized access, and insider threats.

This proactive security model shifts the focus from network location to identity, device posture, and contextual access requirements, strengthening security postures and minimizing attack surfaces across enterprise and IoT ecosystems.

© Copyright @ aic2024. All Rights Reserved