Journal of Information Security Reserach ›› 2024, Vol. 10 ›› Issue (10): 896-.

Previous Articles     Next Articles

A Retrospective and Future Development Study of Zero Trust Architecture

Wang Ruohan, Xiang Ji, Guan Changyu, and Wang Lei   

  1. (Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100092)
    (School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049)
  • Online:2024-10-15 Published:2024-10-15

零信任架构的回望与未来发展研究

王若晗向继管长御王雷   

  1. (中国科学院信息工程研究所北京100092)
    (中国科学院大学网络空间安全学院北京100049)
  • 通讯作者: 王若晗 博士研究生.主要研究方向为网络空间安全、推荐系统. wangruohan@iie.ac.cn
  • 作者简介:王若晗 博士研究生.主要研究方向为网络空间安全、推荐系统. wangruohan@iie.ac.cn 向继 博士.正高级工程师.主要研究方向为网络与信息安全. xiangji@iie.ac.cn 管长御 硕士.主要研究方向为知识图谱. guanchangyu@iie.ac.cn 王雷 博士,高级工程师.主要研究方向为大数据智能分析与管理技术、密码应用. wanglei@iie.ac.cn

Abstract: With the rapid development of the internet, big data, and cloud computing, the zero trust architecture has been proposed as a new security paradigm to address the challenges of modern digitalization. This security model is built on never inherently trusting any internal or external requests, emphasizing that access must be granted through constant verification and monitoring. The core principles of zero trust include comprehensive identity verification, access control, least privilege, pervasive encryption, and continuous risk assessment and response. This article primarily reviews the development history of zero trust architecture, elaborates on the basic concepts of the zero zrust mechanism, and finally summarizes the future development of zero trust architecture.

Key words: zero trust, zero trust architecture, zero trust mechanism, cloud computing, cyber security

摘要: 随着互联网、大数据和云计算的快速发展,为了应对现代数字化的挑战,零信任架构作为一种新的安全范式被提出.该安全模型建立在从不默认信任任何内部或外部请求的原则上,强调必须通过持续的验证和监控授予访问权限.零信任的核心原则包括全面身份验证、访问控制、最小权限、普遍加密和持续的风险评估与应对.主要通过对零信任架构的发展历史进行回顾,以及对零信任机制的基本概念进行阐述,最后对零信任架构未来的发展进行总结.

关键词: 零信任, 零信任架构, 零信任机制, 云计算, 网络空间安全

CLC Number: