Abstract
Cybersecurity is critical in preventing infractions, maintaining digital workplace discipline, and ensuring that laws and regulations are obeyed. Zero Trust Architecture (ZTA), often known as perimeter-less security, is a novel method for designing and implementing secured IT systems. Zero trust's basic notion is “never trust, always verify,” which indicates that devices should not be trusted by default. This means that each access from or to any asset must be assessed and follow the standard guidelines of the organization. Maintaining this type of control imposes a high burden on IT security and system administrators to be able to track and validate each control and manually sustain the configuration needed. With the power of Classification Algorithms in Machine Learning, we will explore in this paper an alternative solution to save time and effort and help maintain the same security posture with less human intervention. The proposed approach utilizes the information from available security feeds and statically configured policies to enforce and maintain zero-trust network policies. By analyzing the data, it will be feasible to identify the required policies to be configured and compare them against the traditional compliance rules to auto-configure the policies. This approach aims to enhance the existing security intelligence engines with more sophisticated rules and less time and effort.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.