Skip to main content
Log in

Dirk Fox

Zero Trust

  • Gateway
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Jericho Forum: Commandments v1.2. https://collaboration.opengroup.org/jericho/commandments_v1.2.pdf, 2007.

  2. John Kindervag (Forrester Research): Build Security Into Your Network’s DNA: The Zero Trust Network Architecture. http://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf, 2010.

  3. Rory Ward, Betsy Beyer: BeyondCorp: A New Approach to Enterprise Security, https://research.google/pubs/pub43231/, Vol. 39, No. 6, 2014, pp. 6-11.

  4. Identity Defined Security Alliance: The Path to Zero Trust starts with Identity. Whitepaper, https://www.idsalliance.org/wp-content/uploads/2019/07/IDSA_Zero-Trust_Whitepaper.pdf, 2019.

  5. Scott Rose, Oliver Borchert, Stu Mitchell, Sean Connelly: Zero Trust Architecture. NIST Special Publication 800-207, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf, August 2020.

  6. Ken Machtley: Evolving Zero Trust. Microsoft Position Paper, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWJJdT, Nov. 2021.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fox, D. Zero Trust. Datenschutz Datensich 46, 174–175 (2022). https://doi.org/10.1007/s11623-022-1583-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-022-1583-x

Navigation