Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges
作者机构:Centre for Cyber Resilience and TrustDeakin UniversityBurwood 3125Australia School of Information TechnologyDeakin UniversityGeelong 3216Australia
出 版 物:《Machine Intelligence Research》 (机器智能研究(英文版))
年 卷 期:2024年第21卷第2期
页 面:294-317页
核心收录:
学科分类:0711[理学-系统科学] 07[理学] 081104[工学-模式识别与智能系统] 08[工学] 0811[工学-控制科学与工程] 071102[理学-系统分析与集成] 081103[工学-系统工程]
基 金:Open Access funding enabled and organized by CAUL and its Member Institutions
主 题:Zero trust architecture cyber security artificial intelligence access control authentication
摘 要:Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access *** is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security *** can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network ***,ZTA automation and orchestration,towards seamless deployment on real-world networks,has been limited to be reviewed in the existing *** this paper,we first identify the bottlenecks,discuss the background of ZTA and compare it with traditional perimeter-based security *** importantly,we provide an in-depth analysis of state-of-the-art AI techniques that have the potential in the automation and orchestration of ***,in this review paper,we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA.