Using Context-Aware and Identity-First Defense in Zero Trust Security Architecture to Protect Cyberspace
Guardado en:
| Publicado en: | The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Conference Proceedings (2025), p. 351-356 |
|---|---|
| Autor principal: | |
| Otros Autores: | , , , , |
| Publicado: |
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
|
| Materias: | |
| Acceso en línea: | Citation/Abstract |
| Etiquetas: |
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
| Resumen: | Conference Title: 2025 3rd International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI)Conference Start Date: 2025 Sept. 17Conference End Date: 2025 Sept. 19Conference Location: Coimbatore, IndiaWith the increasing sophistication and frequency of cyberattacks, traditional perimeter-based security models have become obsolete. Zero Trust Security Architecture (ZTSA) offers a transformative approach by enforcing the principle of "never trust, always verify." This paper presents a comprehensive framework that integrates context-aware security and identity-first defense within ZTSA to enhance the protection of digital infrastructures. Context-aware mechanisms continuously evaluate factors such as user behavior, device health, location, and access timing to make dynamic access decisions. In parallel, identity-first defense positions verified identity as the core element of security, ensuring that access to resources is granted only after strict authentication and authorization checks. The proposed model leverages continuous monitoring, adaptive policy enforcement, and risk-based access control to minimize attack surfaces and prevent unauthorized lateral movement. Experimental evaluations demonstrate that this integrated approach significantly improves detection of anomalous behavior and resistance to advanced persistent threats (APTs) and insider attacks. The solution supports scalability and compliance in complex enterprise environments, providing a future-ready blueprint for cyber defense. By aligning identity and context in real-time, this strategy strengthens the core principles of Zero Trust and ensures more resilient cybersecurity frameworks. |
|---|---|
| DOI: | 10.1109/ICoICI65217.2025.11254505 |
| Fuente: | Science Database |