Back to Search

The Zero-trust Paradigm: Concepts, Architectures and Applications

AUTHOR Katsis, Charalampos; Bertino, Elisa
PUBLISHER Now Publishers (06/10/2025)
PRODUCT TYPE Paperback (Paperback)

Description

Existing measures aimed at securing network perimeters have demonstrated insufficiency in preventing breaches within an organization's infrastructure. This inadequacy stems from the escalating resource capabilities of adversaries and the increasing sophistication of multi-step attack strategies, rendering breaches feasible. Zero Trust Architecture (ZTA), also known as perimeter-less security, is a recent paradigm that challenges the conventional notion of network security by considering both internal and external networks as potentially compromised and that threats exist at all times in the network. The notion of ZTA has been introduced as a fine-grained defense approach. It assumes that no entities outside and inside the protected system can be trusted and, therefore, requires articulated and high coverage deployment of security controls. However, ZTA is a complex notion that does not have a single design solution, rather, it consists of numerous interconnected concepts and processes that need to be assessed prior to deciding on a solution.

In this monograph, the authors cover the principles and architectural foundations of ZTA following the guidelines by NIST, and provide a detailed analysis of ZTA proposed by research and industry. The monograph also describes an approach for the automatic generation of Zero Trust (ZT) policies based on application communication requirements, network topology, and organizational information. This approach was designed to meet a critical need of ZTA, that is, the generation and implementation of a large number of fine-grained policies. Finally, the monograph discusses several research directions, including the incorporation of threat intelligence into ZT networks and the use of large language models.

Show More
Product Format
Product Details
ISBN-13: 9781638285724
ISBN-10: 1638285721
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 146
Carton Quantity: 52
Product Dimensions: 6.14 x 0.32 x 9.21 inches
Weight: 0.48 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | Security - Network Security
Computers | Artificial Intelligence - Computer Vision & Pattern Recognit
Descriptions, Reviews, Etc.
publisher marketing

Existing measures aimed at securing network perimeters have demonstrated insufficiency in preventing breaches within an organization's infrastructure. This inadequacy stems from the escalating resource capabilities of adversaries and the increasing sophistication of multi-step attack strategies, rendering breaches feasible. Zero Trust Architecture (ZTA), also known as perimeter-less security, is a recent paradigm that challenges the conventional notion of network security by considering both internal and external networks as potentially compromised and that threats exist at all times in the network. The notion of ZTA has been introduced as a fine-grained defense approach. It assumes that no entities outside and inside the protected system can be trusted and, therefore, requires articulated and high coverage deployment of security controls. However, ZTA is a complex notion that does not have a single design solution, rather, it consists of numerous interconnected concepts and processes that need to be assessed prior to deciding on a solution.

In this monograph, the authors cover the principles and architectural foundations of ZTA following the guidelines by NIST, and provide a detailed analysis of ZTA proposed by research and industry. The monograph also describes an approach for the automatic generation of Zero Trust (ZT) policies based on application communication requirements, network topology, and organizational information. This approach was designed to meet a critical need of ZTA, that is, the generation and implementation of a large number of fine-grained policies. Finally, the monograph discusses several research directions, including the incorporation of threat intelligence into ZT networks and the use of large language models.

Show More
List Price $95.00
Your Price  $94.05
Paperback