Foundations and Trends® in Privacy and Security > Vol 8 > Issue 2

The Zero-trust Paradigm: Concepts, Architectures and Applications

By Charalampos Katsis, Purdue University, USA, ckatsis@purdue.edu | Elisa Bertino, Purdue University, USA, bertino@purdue.edu

 
Suggested Citation
Charalampos Katsis and Elisa Bertino (2025), "The Zero-trust Paradigm: Concepts, Architectures and Applications", Foundations and Trends® in Privacy and Security: Vol. 8: No. 2, pp 122-253. http://dx.doi.org/10.1561/3300000046

Publication Date: 10 Jun 2025
© 2025 C. Katsis and E. Bertino
 
Subjects
Communication system design,  Pattern recognition and learning,  Access control,  Authentication,  Information flow,  Intrusion detection,  Network security,  Security and privacy policies,  Security architectures
 

Free Preview:

Download extract

Share

Download article
In this article:
1. Introduction
2. Security Controls and Guidelines
3. Architectures
4. The NEUTRON Framework
5. Industry Efforts
6. Concluding Remarks and Research Directions
Acknowledgements
References

Abstract

The notion of Zero Trust Architecture (ZTA) has been introduced as a fine-grained defense approach. It assumes that no entities outside and inside the protected system can be trusted and, therefore, requires articulated and high-coverage deployment of security controls. However, ZTA is a complex notion that does not have a single design solution; rather, it consists of numerous interconnected concepts and processes that need to be assessed prior to deciding on a solution. In this monograph, we cover the principles and architectural foundations of ZTA, basically following the guidelines by NIST, and provide a detailed analysis of ZT architectures proposed by research and industry. The monograph also describes an approach for the automatic generation of ZT policies based on application communication requirements, network topology, and organizational information. This approach was designed to meet a critical need of ZTA, that is, the generation and implementation of a large number of fine-grained policies. Finally, the monograph discusses several research directions, including the incorporation of threat intelligence into ZT networks and the use of large language models (LLMs).

DOI:10.1561/3300000046
ISBN: 978-1-63828-572-4
146 pp. $95.00
Buy book (pb)
 
ISBN: 978-1-63828-573-1
146 pp. $160.00
Buy E-book (.pdf)
Table of contents:
1. Introduction
2. Security Controls and Guidelines
3. Architectures
4. The NEUTRON Framework
5. Industry Efforts
6. Concluding Remarks and Research Directions
Acknowledgements
References

The Zero-trust Paradigm: Concepts, Architectures and Applications

Existing measures aimed at securing network perimeters have demonstrated insufficiency in preventing breaches within an organization’s infrastructure. This inadequacy stems from the escalating resource capabilities of adversaries and the increasing sophistication of multi-step attack strategies, rendering breaches feasible. Zero Trust Architecture (ZTA), also known as perimeter-less security, is a recent paradigm that challenges the conventional notion of network security by considering both internal and external networks as potentially compromised and that threats exist at all times in the network. The notion of ZTA has been introduced as a fine-grained defense approach. It assumes that no entities outside and inside the protected system can be trusted and, therefore, requires articulated and high coverage deployment of security controls. However, ZTA is a complex notion that does not have a single design solution, rather, it consists of numerous interconnected concepts and processes that need to be assessed prior to deciding on a solution.

In this monograph, the authors cover the principles and architectural foundations of ZTA following the guidelines by NIST, and provide a detailed analysis of ZTA proposed by research and industry. The monograph also describes an approach for the automatic generation of Zero Trust (ZT) policies based on application communication requirements, network topology, and organizational information. This approach was designed to meet a critical need of ZTA, that is, the generation and implementation of a large number of fine-grained policies. Finally, the monograph discusses several research directions, including the incorporation of threat intelligence into ZT networks and the use of large language models.

 
SEC-046