An Abstract Security Pattern for Zero Trust Access Control

PLoP '22: Proceedings of the 29th Conference on Pattern Languages of Programs(2023)

引用 0|浏览6
暂无评分
摘要
Information systems have become very complex due to their increasing distribution, interconnection, and need to support complex communication structures. Zero Trust Architecture (ZTA) has been introduced as a solution to the security problems of complex networked systems. We present here a pattern to enforce the application of security controls on incoming requests from a variety of locations addressing data and services that are also heavily distributed. The Abstract Zero Trust Access Control pattern restricts access to the resources of a system by authenticating every network access request and enforcing authorization constraints to access specific resources; its enforcement applies two security principles: least privilege and complete mediation. While there are several other patterns that can be applied to implement a Zero Trust Architecture, this is its most fundamental pattern.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要