Zero Trust Security
Downloads
Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, whether they are inside or outside the perimeter of the network. No specific technology is associated with the Zero Trust architecture; It is a holistic approach to network security that incorporates several different principles and technologies. The traditional security of the IT network is based on the „castle-and-moat” concept. In that model, it's hard to gain access from outside the network, but everyone on the network is trusted by default. The problem with this approach is that once an attacker gains access to the network, he has free rein over everything inside.
Downloads
Reveron, Derek S. „Cyberspace and National Security – threats, opportunities and power in a virtual world”, Georgetown University Press, Washington DC, 2018.
Grimes, Roger A. „Hacking Multifactor Authentication”, Wiley, September 2020.
Kenneth Geers, „Strategic Cyber Security”, NATO Cooperative Cyber Defense Center of Excellence, 2011.
IBM Security, „Cost of a Data Breach Report 2021” https://www.ibm.com/downloads/cas/OJDVQGRY.
Eefke Smit, Jeffrey Van Der Hoeven, David Giaretta, „Avoiding a Digital Dark Age for data: why publishers should care about digital preservation„ Learned Publishing, Volume 24 Issue 1, Jan 2021.
Kurt DelBene, Milo Medin, Richard Murray, „The Road to Zero Trust (Security)” [White paper] https://media.defense.gov/2019/Jul/09/2002155219/-1/-1/0/DIB_THE_ROAD_TO_ZERO_TRUST_(SECURITY)_07.08.2019.PDF.
Forescout, „Total visiblity: The Master Key to Zero Trust Security” [White paper], https://www.forescout.com/resources/total-visibility-the-master-key-to-zero-trust/.
Jason Garbis, Jerry W. Chapman, „Zero Trust Security - An Enterprise Guide”, Apress, 2021.
Scott Rose, Oliver Borchert, Stu Mitchell, Sean Connelly “Zero Trust Architecture”, NIST (SP) 800-207, 2020.




