The University of Jordan :: Research Groups :: Zero Trust Architecture (ZTA)
Trending

Zero Trust Architecture (ZTA)

The Zero Trust model, which operates under the principle of "never trust, always verify," has gained significant traction in modern cybersecurity frameworks. Instead of trusting users or devices based on their location within the network, Zero Trust assumes that both external and internal networks are untrusted.

Trending Areas of Research:

  • Identity and Access Management (IAM): Research is focused on improving methods for real-time verification of user identities using multi-factor authentication (MFA) and biometric authentication.
  • Micro-Segmentation: Researchers are exploring new ways to implement micro-segmentation within a Zero Trust framework to limit the lateral movement of attackers inside a network.
  • Policy Automation: The automation of policy enforcement in Zero Trust environments using AI-driven decisions is another hot research area.

Recent Findings:

  • A study showed that implementing Zero Trust Architecture in cloud environments significantly reduced the potential attack surface by making it harder for attackers to move laterally once inside the network.
  • Research on AI-powered Zero Trust models has shown that machine learning can dynamically adjust access controls based on the risk profile of users and devices in real-time.​

Zero Trust Architecture (ZTA).