The work is devoted to theoretical and practical aspects of computer systems design based on the zero trust concept. Based on the system thinking of analyzing existing zero trust systems and theoretical models used in their design, the work describes key problems of implementing zero trust systems. Also, based on design and security patterns, the principles representation of the zero trust concept and the abstract access control model (pattern) of the Zero Trust Architecture are considered.The principles representation can be used to mine abstract design and security patterns, and the access control pattern – to create derivative patterns and architectures of computer systems based on zero trust. An advance of the access control pattern is the capacity to more fully formulate functional requirements and represent the architectures of the designed systems due to the description of access control levels (network path, session, transaction).
Read full abstract