Literatur
Jericho Forum: Commandments v1.2. https://collaboration.opengroup.org/jericho/commandments_v1.2.pdf, 2007.
John Kindervag (Forrester Research): Build Security Into Your Network’s DNA: The Zero Trust Network Architecture. http://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf, 2010.
Rory Ward, Betsy Beyer: BeyondCorp: A New Approach to Enterprise Security, https://research.google/pubs/pub43231/, Vol. 39, No. 6, 2014, pp. 6-11.
Identity Defined Security Alliance: The Path to Zero Trust starts with Identity. Whitepaper, https://www.idsalliance.org/wp-content/uploads/2019/07/IDSA_Zero-Trust_Whitepaper.pdf, 2019.
Scott Rose, Oliver Borchert, Stu Mitchell, Sean Connelly: Zero Trust Architecture. NIST Special Publication 800-207, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf, August 2020.
Ken Machtley: Evolving Zero Trust. Microsoft Position Paper, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWJJdT, Nov. 2021.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Fox, D. Zero Trust. Datenschutz Datensich 46, 174–175 (2022). https://doi.org/10.1007/s11623-022-1583-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-022-1583-x