Zero Trust Cybersecurity: Procedures and Considerations in Context
Definition
:1. Introduction
2. Principles of Zero-Trust Cybersecurity
2.1. Never Trust, Always Verify
2.2. Implement the Least Privilege
2.3. Assume Breach and Plan for the Worst
3. Comparison among Different Cybersecurity Models
4. Issues for Implementing Zero Trust
4.1. Insider Threat Management
4.1.1. Continuous Monitoring
4.1.2. Access Controls and Least Privilege
4.1.3. Training and Awareness
4.2. Customers/Users/Patrons
4.3. Cybersecurity Awareness for Customers/Users/Patrons
4.4. User-Focused Solutions
4.5. Hybrid Cloud Protection
4.5.1. Challenges in Hybrid Cloud Security
4.5.2. Implementing a Security Framework
4.5.3. Data Protection
4.5.4. Privacy
4.5.5. Monitoring and Detection
4.5.6. Access Controls and Least Privilege
5. Contextual Differences in Zero-Trust Cybersecurity
The University Environment
- Zero trust can limit access to only the information employees need when they need it [70]. For instance, it is possible a student employee may need to access student records in the course of their work, but they have no legitimate rationale to have access to this information outside of work hours and their workstation.
- Faculty members have substantial amounts of information, including student grades and funding accounts, that must be protected [71]. When they leave a computer station unattended—such as in a classroom when they leave to use the restroom—they create a vulnerability. Session timeouts can protect these workstations by locking the computer and requiring a fresh log-in to access the station again. While this solution may cause frustration for some faculty members, it may also prevent a major breach.
- Students require access to many systems, offering a slightly different dynamic where they must share large amounts of private information but have limited access to the stored information of others [72]. Permissions must be managed to protect students from their own peers.
6. The Library Environment
- Protecting patrons against invasions of privacy by authorities could be supported by zero trust measures. Historically, library records have been a target of police, who might use them to monitor patron behavior. The American Library Association, the leading organization for libraries, strongly opposes this activity and supports practices that restrict these efforts [76]. Nonetheless, it can be intimidating for an unprepared front-line library worker if confronted by law enforcement. A zero-trust system could prevent these officials from easily gaining access to this information from a front-line employee, forcing them to follow the prescribed path of receiving a warrant and communicating with the library director.
- As with the case of an instructor who leaves a computer unattended, session timeouts can be used to secure employee workstations to ensure no unmonitored patrons gain access to unauthorized information [77].
7. The Supply Chain Environment
- Supply chain organizations need to identify participants and boundaries, distinguish between internal and external participants (including suppliers, clients, and internal employees), and understand their roles and the level of access required [84].
- Identify supply chain assets by cataloging data, information, and systems within the enterprise, recognizing non-enterprise participants and technologies that interact with the supply chain, and understanding general business processes related to the organization’s mission, such as trust-related processes and contractually mandated procedures for non-enterprise participants, identifying threats posed by participants, assets, and processes, and conducting risk assessments to prioritize zero-trust implementation and its impact on business objectives [84].
- During deployment and monitoring, the organization should decide on a deployment strategy, possibly using a trial mode, and gather the necessary data to evaluate success while ensuring the ability to revert to the previous configuration [84].
- Finally, implementing zero trust involves designing an iterative process that builds on successes and learns from failures, gradually transitioning, adjusting priorities, and incorporating continuous improvement into deployments [84].
8. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. Zero Trust Architecture; NIST Special Publication, 800-207; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020.
- Bridge, S.; Zoledziowski, A. 1 Million Books and 4 Months Later, Toronto’s Library Recovers from a Cyberattack. Canadian Broadcasting Corporation. 2024. Available online: https://www.cbc.ca/news/canada/toronto/toronto-library-ransomware-recovery-1.7126412 (accessed on 12 June 2024).
- Kerman, A. Zero Trust Cybersecurity: ‘Never Trust, Always Verify’. 2020. Available online: https://www.nist.gov/blogs/taking-measure/zero-trust-cybersecurity-never-trust-always-verify (accessed on 14 July 2024).
- Department of Defense. Zero Trust Referenced Architecture. 2022. Available online: https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v2.0(U)_Sep22.pdf (accessed on 12 July 2024).
- Kang, H.; Liu, G.; Wang, Q.; Meng, L.; Liu, J. Theory and Application of Zero Trust Se-curity: A Brief Survey. Entropy 2023, 25, 1595. [Google Scholar] [CrossRef] [PubMed]
- Chen, Y.; Hu, H.; Cheng, G. Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties. Front. Inf. Technol. Electron. Eng. 2019, 20, 238–252. [Google Scholar] [CrossRef]
- Assunção, P. A zero-trust approach to network security. In Proceedings of the Digital Privacy and Security Conference, Porto, Portugal, 16 January 2019; pp. 65–72. [Google Scholar]
- Kumar, P.; Moubayed, A.; Refaey, A.; Shami, A.; Koilpillai, J. Performance Analysis of SDP For Secure Internal Enterprises. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Buck, C.; Olenberger, C.; Schweizer, A.; Völter, F.; Eymann, T. Never trust, always veri-fy: A multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 2021, 110, 102436. [Google Scholar] [CrossRef]
- Rivera, J.J.D.; Muhammad, A.; Song, W.C. Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open J. Commun. Soc. 2024, 5, 2792–2814. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmanos, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef]
- Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-factor authentication: A survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef]
- Cunningham, C. Zero Trust. 2018. Available online: https://go.forrester.com/blogs/next-generation-access-and-zero-trust/ (accessed on 14 June 2024).
- Identity Management Institute. Digital Identity Certificate. Available online: https://identitymanagementinstitute.org/digital-identity-certificate/ (accessed on 18 June 2024).
- West, M. Preventing system intrusions. In Network and System Security; Vacca, J.J., Ed.; Syngress: Newton, MA, USA, 2013; pp. 29–56. [Google Scholar]
- DelBene, K.; Medin, M.; Murray, R. The Road to Zero Trust (Security); DIB Zero Trust White Paper, 9; U.S. Department of Defense: Washington, DC, USA, 2019.
- Azad, M.A.; Abdullah, S.; Arshad, J.; Lallie, H.; Ahmed, Y.H. Verify and trust: A multidimensional survey of zero-trust security in the age of IoT. Internet Things 2024, 27, 101227. [Google Scholar] [CrossRef]
- Bandari, V. Enterprise data security measures: A comparative review of effectiveness and risks across different industries and organization types. Int. J. Bus. Intell. Big Data Anal. 2023, 6, 1–11. [Google Scholar]
- Ferraiolo, D.F.; Sandhu, R.; Gavrila, S.; Kuhn, D.R.; Chandramouli, R. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 2001, 4, 224–274. [Google Scholar] [CrossRef]
- Sandhu, R.S. Role-based access control. IEEE Comput. Comput. 1995, 29, 38–47. [Google Scholar] [CrossRef]
- Fadhel, A.B.; Bianculli, D.; Briand, L. A comprehensive modeling framework for role-based access control policies. J. Syst. Softw. 2015, 107, 110–126. [Google Scholar] [CrossRef]
- Yao, Q.; Wang, Q.; Zhang, X.; Fei, J. Dynamic access control and authorization system based on zero-trust architecture. In Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System, Xiamen, China, 27–28 October 2020; pp. 123–127. [Google Scholar]
- Simpson, W.R.; Foltz, K.E. Network Segmentation and Zero Trust Architectures. In Proceedings of the World Congress on Engineering 2021, London, UK, 7–9 July 2021. [Google Scholar]
- Wagner, N.; Sahin, C.S.; Peña, J.; Streilein, W. Automatic Generation of Cyber Architectures Optimized for Security, Cost, and Mission Performance: A Nature-Inspired Approach. In Advances in Nature-Inspired Computing and Applicationspp; Springer: Cham, Switzerland, 2019; pp. 1–25. [Google Scholar] [CrossRef]
- Simpson, W.R. Toward a zero trust metric. Procedia Comput. Sci. 2022, 204, 123–130. [Google Scholar] [CrossRef]
- Kallatsa, M. Strategies for Network Segmentation: A Systematic Literature Review. Master’s Thesis, University of Jyväskylä, Jyväskylä, Finland, 2024. [Google Scholar]
- Hemberg, E.; Zipkin, J.R.; Skowyra, R.W.; Wagner, N.; O’Reilly, U.-M. Adversarial Co-Evolution of Attack and Defense in a Segmented Computer Network Environment. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, Kyoto, Japan, 15–19 July 2019; pp. 1648–1655. [Google Scholar] [CrossRef]
- Katsis, C.; Cicala, F.; Thomsen, D.; Ringo, N.; Bertino, E. Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, Virtual, 16–18 June 2021; pp. 165–174. [Google Scholar] [CrossRef]
- Ghosemajumder, S. You Can’t Secure 100% of Your Data 100% of the Time. 2017. Available online: https://hbr.org/2017/12/you-cant-secure-100-of-your-data-100-of-the-time (accessed on 12 June 2024).
- Kujo, J. Implementing Zero trust Architecture for Identities and Endpoints. Master’s Thesis, Jamk University of Applied Sciences, Jyväskylä, Finland, 2023. Available online: https://www.theseus.fi/bitstream/handle/10024/796603/Thesis_Jani_Kujo.pdf?sequence=2 (accessed on 15 June 2024).
- National Institute of Standards and Technology. Guide for Conducting Risk Assessment. 2012. Available online: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf (accessed on 10 July 2024).
- Deane, A.J.; Kraus, A. The Official (ISC)2 CISSP CBK Reference, 6th ed.; Wiley: Hoboken, NJ, USA, 2021. [Google Scholar]
- Cappelli, D.; Moore, A.; Trzeciak, R. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud); Addison-Wesley Professional: Boston, MA, USA, 2012. [Google Scholar]
- Ophoff, J.; Jensen, A.; Sanderson-Smith, J.; Porter, M. A descriptive literature review and classification of insider threat research. InSITE 2014, 14, 211–223. [Google Scholar]
- Rousseau, T.L. Insider Threat: Replacing the Trusted Security Model. Ph.D. Thesis, Capella University, Minneapolis, MN, USA, 2021. [Google Scholar]
- Greitzer, F.L. Insider threats: It’s the human, stupid! In Proceedings of the Northwest Cybersecurity Symposium, Richland, WA, USA, 8–10 April 2019; pp. 1–8. [Google Scholar]
- Homoliak, I.; Toffalini, F.; Guarnizo, J.; Elovici, Y.; Ochoa, M. Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Comput. Surv. (CSUR) 2019, 52, 1–40. [Google Scholar] [CrossRef]
- Shah, V. Machine Learning Algorithms for Cybersecurity: Detecting and Preventing Threats. Rev. Esp. Doc. Cient. 2021, 15, 42–66. [Google Scholar]
- Rabbani, M.; Wang, Y.; Khoshkangini, R.; Jelodar, H.; Zhao, R.; Bagheri Baba Ahmadi, S.; Ayobi, S. A review on machine learning approaches for network malicious behavior detection in emerging technologies. Entropy 2021, 23, 529. [Google Scholar] [CrossRef]
- Ciampa, M. CompTIA Security+ Guide to Network Security Fundamentals; Cengage Learning: Boston, MA, USA, 2017. [Google Scholar]
- Johri, A.; Kumar, S. Exploring customer awareness towards their cyber security in the Kingdom of Saudi Arabia: A study in the era of banking digital transformation. Hum. Behav. Emerg. Technol. 2023, 2023, 2103442. [Google Scholar] [CrossRef]
- Moallem, A. Cybersecurity Awareness among Students and Faculty; CRC Press: Boca Raton, FL, USA, 2019. [Google Scholar]
- Ameen, N.; Tarhini, A.; Shah, M.H.; Madichie, N.; Paul, J.; Choudrie, J. Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Comput. Hum. Behav. 2021, 114, 106531. [Google Scholar] [CrossRef]
- McCrohan, K.F.; Engel, K.; Harvey, J.W. Influence of awareness and training on cyber security. J. Internet Commer. 2010, 9, 23–41. [Google Scholar] [CrossRef]
- Norris, D.F.; Mateczun, L.; Joshi, A.; Finin, T. Cybersecurity at the grassroots: American local governments and the challenges of internet security. J. Homel. Secur. Emerg. Manag. 2018, 15, 20170048. [Google Scholar] [CrossRef]
- Miranda, M.J. Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach. Int. Manag. Rev. 2018, 14, 5–10. [Google Scholar]
- Li, Y.; Xin, T.; Siponen, M. Citizens’ cybersecurity behavior: Some major challenges. IEEE Secur. Priv. 2022, 20, 54–61. [Google Scholar] [CrossRef]
- Zhang, Z.; He, W.; Li, W.; Abdous, M.H. Cybersecurity awareness training programs: A cost–benefit analysis framework. Ind. Manag. Data Syst. 2021, 121, 613–636. [Google Scholar]
- Nurse, J.R.; Creese, S.; Goldsmith, M.; Lamberts, K. Guidelines for usable cybersecurity: Past and present. In Proceedings of the 2011 Third International Workshop on Cyberspace Safety and Security (CSS), Milan, Italy, 8 September 2011; pp. 21–26. [Google Scholar]
- AlQadheeb, A.; Bhattacharyya, S.; Perl, S. Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior. Array 2022, 14, 100146. [Google Scholar] [CrossRef]
- Phiayura, P.; Teerakanok, S. A comprehensive framework for migrating to zero trust architecture. IEEE Access 2023, 11, 19487–19511. [Google Scholar] [CrossRef]
- Tissir, N.; El Kafhali, S.; Aboutabit, N. Cybersecurity management in cloud computing: Semantic literature review and conceptual framework proposalLinks to an external site. J. Reliab. Intell. Environ. 2021, 7, 69–84. [Google Scholar] [CrossRef]
- Tabrizchi, H.; Kuchaki Rafsanjani, M. A survey on security challenges in cloud computing: Issues, threats, and solutions. J. Supercomput. 2020, 76, 9493–9532. [Google Scholar] [CrossRef]
- Cloud Security Alliance. Toward a Zero Trust Architecture: A Guided Approach for a Complex and Hybrid World; Cloud Security Alliance: Seattle, WA, USA, 2021. [Google Scholar]
- National Institute of Standards and Technology (NIST). The NIST Cybersecurity Framework (CFS) 2.0; National Institute of Standards: Washington, DC, USA, 2024. [Google Scholar]
- Fotiou, N.; Machas, A.; Polyzos, G.C.; Xylomenos, G. Access control as a service for the Cloud. J. Internet Serv. Appl. 2015, 6, 1–15. [Google Scholar] [CrossRef]
- Sun, P. Security and privacy protection in cloud computing: Discussions and challenges. J. Netw. Comput. Appl. 2020, 160, 102642. [Google Scholar] [CrossRef]
- Tourani, R.; Stubbs, R.; Misra, S. TACTIC: Tag-based access control framework for the information-centric wireless edge networks. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2–6 July 2018; pp. 456–466. [Google Scholar]
- Ang, Z. A Survey of Security Issues in Mobile Cloud ComputingLinks to an external site. In Proceedings of the 2021 International Conference on Signal Processing and Machine Learning (CONF-SPML), Beijing, China, 18–20 August 2021; pp. 117–121. [Google Scholar]
- Kumar, P.R.; Raj, P.H.; Jelciana, P. Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 2018, 125, 691–697. [Google Scholar] [CrossRef]
- Reed, C.; Rezek, C.; Simmonds, P. Security Guidance for Critical Area of Focus in Cloud Computing V3.0; Cloud Security Alliance (CSA): Seattle, WA, USA, 2011; pp. 1–177. [Google Scholar]
- Loaiza Enriquez, R. Cloud Security Posture Management/CSPM) in Azure. Bachelor’s Thesis, Metropolia University of Applied Sciences, Metropolia, Finland, 2021. [Google Scholar]
- Mo, J.; Hu, Z.; Chen, H.; Shen, W. An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wirel. Commun. Mob. Comput. 2019, 2019, 4520685. [Google Scholar] [CrossRef]
- Ahmed, A.A.; Wendy, K.; Kabir, M.N.; Sadiq, A.S. Dynamic reciprocal authentication protocol for mobile cloud computing. IEEE Syst. J. 2020, 15, 727–737. [Google Scholar] [CrossRef]
- Derhab, A.; Belaoued, M.; Guerroumi, M.; Khan, F.A. Two-factor mutual authentication offloading for mobile cloud computing. IEEE Access 2020, 8, 28956–28969. [Google Scholar] [CrossRef]
- Mugabo, E.; Zhang, Q.Y. Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. Int. J. Netw. Secur. 2020, 22, 231–241. [Google Scholar]
- Ogwara, N.O.; Petrova, K.; Yang, M.L.; MacDonell, S. Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach. In Advances in Security, Networks, and Internet of Things: Proceedings from SAM’20, ICWN’20, ICOMP’20, and ESCS’20; Springer: Cham, Switzerland, 2021; pp. 129–145. [Google Scholar]
- Ackson, M. The Impact of Cyberattacks and Cyberthreats on Higher Education Institutions. Master’s Thesis, The College of St. Scholastica, Duluth, MN, USA, 2021. [Google Scholar]
- Ghosh, M.M.A.; Atallah, R.R.; Naser, S.S.A. Secure mobile cloud computing for sensitive data: Teacher services for Palestinian higher education institutions. Int. J. Grid Distrib. Comput. 2016, 9, 17–22. [Google Scholar] [CrossRef]
- DeWeaver, L.F. Exploring How Universities Can Reduce Successful Cyberattacks by Incorporating Zero Trust. Ph.D. Thesis, Colorado Technical University, Colorado Springs, CO, USA, 2021. [Google Scholar]
- Culnan, M.J.; Carlin, T.J. Online privacy practices in higher education: Making the grade? Commun. ACM 2009, 52, 126–130. [Google Scholar] [CrossRef]
- Daraghmi, E.Y.; Daraghmi, Y.A.; Yuan, S.M. UniChain: A design of blockchain-based system for electronic academic records access and permissions management. Appl. Sci. 2019, 9, 4966. [Google Scholar] [CrossRef]
- Lund, B.D. Public libraries’ data privacy policies: A content and cluster analysis. Ser. Libr. 2021, 81, 99–107. [Google Scholar] [CrossRef]
- Hess, A.N.; LaPorte-Fiori, R.; Engwall, K. Preserving patron privacy in the 21st century academic library. J. Acad. Librariansh. 2015, 41, 105–114. [Google Scholar] [CrossRef]
- Amini, M.; Vakilimofrad, H.; Saberi, M.K. Human factors affecting information security in libraries. Bottom Line 2021, 34, 45–67. [Google Scholar] [CrossRef]
- Mars, P. ALA Precedent in Defense of Personal Privacy and Privacy Activism of 21st-Century Information Professionals. Ser. Libr. 2017, 73, 54–57. [Google Scholar] [CrossRef]
- Dietz, F. Timeout Reached, Session Ends? Ph.D. Thesis, Humboldt Universitaet zu Berlin, Berlin, Germany, 2022. [Google Scholar]
- Mentzer, J.; Witt, W.D.; Keebler, J.; Min, S.; Nix, N.; Smith, D.; Zacharia, Z. Defining supply chain management. J. Bus. Logist. 2001, 22, 1–25. [Google Scholar] [CrossRef]
- Council of Supply Chain Management Professionals. Outbound logistics. In CSCMP Supply Chain Management Definitions and Glossary. Available online: https://cscmp.org/CSCMP/Educate/SCM_Definitions_and_Glossary_of_Terms/CSCMP/Educate/SCM_Definitions_and_Glossary_of_Terms.aspx?hkey=60879588-f65f-4ab5-8c4b-6878815ef921 (accessed on 7 July 2024).
- Felea, M.; Albăstroiu, I. Defining the concept of supply chain management and its relevance to Romanian academics and practitioners. Amfiteatru Econ. J. 2013, 15, 74–88. [Google Scholar]
- Canadian Centre for Cyber Security. National Cyber Threat Assessment. 2022. Available online: https://www.cyber.gc.ca/sites/default/files/ncta-2023-24-web.pdf (accessed on 7 July 2024).
- Gopal, P.R.C.; Rana, N.P.; Krishna, T.V.; Ramkumar, M. Impact of big data analytics on supply chain performance: An analysis of influencing factors. Ann. Oper. Res. 2024, 333, 769–797. [Google Scholar] [CrossRef]
- Ogbuke, N.J.; Yusuf, Y.Y.; Dharma, K.; Mercangoz, B.A. Big data supply chain analytics: Ethical, privacy and security challenges posed to business, industries and society. Prod. Plan. Control 2022, 33, 123–137. [Google Scholar] [CrossRef]
- Collier, Z.A.; Sarkis, J. The zero trust supply chain: Managing supply chain risk in the absence of trust. Int. J. Prod. Res. 2021, 59, 3430–3445. [Google Scholar] [CrossRef]
- National Institute of Standards and Technology. Zero Trust Architecture. 2020. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf (accessed on 14 July 2024).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lund, B.D.; Lee, T.-H.; Wang, Z.; Wang, T.; Mannuru, N.R. Zero Trust Cybersecurity: Procedures and Considerations in Context. Encyclopedia 2024, 4, 1520-1533. https://doi.org/10.3390/encyclopedia4040099
Lund BD, Lee T-H, Wang Z, Wang T, Mannuru NR. Zero Trust Cybersecurity: Procedures and Considerations in Context. Encyclopedia. 2024; 4(4):1520-1533. https://doi.org/10.3390/encyclopedia4040099
Chicago/Turabian StyleLund, Brady D., Tae-Hee Lee, Ziang Wang, Ting Wang, and Nishith Reddy Mannuru. 2024. "Zero Trust Cybersecurity: Procedures and Considerations in Context" Encyclopedia 4, no. 4: 1520-1533. https://doi.org/10.3390/encyclopedia4040099