Toward a Zero Trust Architecture Implementation in a University Environment
USMA Research Unit Affiliation
Army Cyber Institute
The core concepts of Zero Trust Architecture have existed since the Jericho Forum in 1994 and have served as the goal of cyber security specialists for many years. Zero Trust Networks and Architectures are extremely appealing to institutions of higher learning because they offer the flexibility to support research and learning while protecting resources with different protection levels, depending on the sensitivity of the resource. This paper investigates how other universities can employ the Zero Trust Architectures using the West Point model.
Record links to items hosted by external providers may require fee for full-text.