Security Mechanisms used in Systems based on Zero Trust Architecture: A Systematic Mapping

Manzano, Carlos; Marquez, Gaston; Astudillo, Hernan; IEEE

Abstract

Zero Trust Architecture (ZTA) is a novel security approach for building secure systems. ZTA-based systems are built with specific security mechanisms to enforce their basic tenets, for example, explicit verification and least privilege. Although existing security mechanisms have been useful in building ZTA-based systems, the current literature does not provide clear guidance on which security mechanisms should be used by developers of these systems. This article describes the design and results of a systematic mapping study to identify the security mechanisms used in the building of ZTA-based systems. The review yielded 290 articles, of which 30 primary studies were selected. Key findings are: (i) 24 different security mechanisms were reported; (ii) 37% of them are classified into access control techniques to implement ZTA least priveleges tenet; (iii) ABAC and AIM are the most used mechanisms; (iv) over half of security mechanisms (69%) focus on resisting attacks (instead of detecting or recovering); and (v) experimentation is a predominant empirical strategy within ZTA security research. The identification of these security mechanisms will enable developers of ZTA-based systems to effectively address the security challenges associated with implementing ZTA tenets.

Más información

Título según WOS: ID WOS:001337958300077 Not found in local WOS DB
Título de la Revista: 2024 L LATIN AMERICAN COMPUTER CONFERENCE, CLEI 2024
Editorial: IEEE
Fecha de publicación: 2024
DOI:

10.1109/CLEI64178.2024.10700484

Notas: ISI