A Survey on Latest Trends and Technologies of Computer Systems Network
Abstract
Zero trust (ZT) represents a set of evolving cybersecurity principles that shift defense strategies from fixed, network-centered perimeters to a focus on users, assets, and resources. A zero trust architecture (ZTA) applies these principles to design industrial and enterprise infrastructure and workflows. Zero trust operates on the idea that no implicit trust is granted to any asset or user account based solely on physical or network location (e.g., a local network versus the internet) or asset ownership (whether enterprise-owned or personal). Both authentication and authorization (of the user and device) are separate steps that must be completed before access to an enterprise resource is allowed. Zero trust is a response to modern network trends such as remote work, bring your own device (BYOD) practices, and the use of cloud-based resources outside an organization’s direct network boundary. Rather than focusing on network segments, zero trust prioritizes securing resources—like assets, services, workflows, and user accounts—because network location alone is no longer considered a main factor in assessing the security posture of a resource. This document provides an outline of zero trust architecture (ZTA), along with general deployment models and use cases where zero trust can enhance an organization’s overall IT security posture.
Keywords: Architecture; Cybersecurity; Enterprise; Network Security; Zero Trust.