Статья опубликована в рамках: Научного журнала «Студенческий» № 17(355)
Рубрика журнала: Информационные технологии
ZERO TRUST SECURITY MODEL AS A MODERN APPROACH TO NETWORK PROTECTION
МОДЕЛЬ БЕЗОПАСНОСТИ ZERO TRUST КАК СОВРЕМЕННЫЙ ПОДХОД К ЗАЩИТЕ СЕТЕЙ
Дорошенко Антон Алексеевич
студент, Институт кибербезопасности и информационных технологий, МИРЭА — Российский технологический университет,
РФ, г. Москва
Сивков Павел Александрович
студент, Институт кибербезопасности и информационных технологий, МИРЭА — Российский технологический университет,
РФ, г. Москва
Нефёдов Александр Сергеевич
студент, Институт кибербезопасности и информационных технологий, МИРЭА — Российский технологический университет,
РФ, г. Москва
Горчаков Алексей Алексеевич
студент, Институт кибербезопасности и информационных технологий, МИРЭА — Российский технологический университет,
РФ, г. Москва
ABSTRACT
This article examines the concept of Zero Trust as a modern approach to cybersecurity. The main principles of the Zero Trust architecture, including continuous verification, multi-factor authentication, network segmentation, and least privilege access, are analyzed. Particular attention is paid to the benefits of this model in the context of increasing cyber threats and the development of remote work.
АННОТАЦИЯ
В статье рассматривается концепция Zero Trust как современный подход к обеспечению информационной безопасности. Анализируются основные принципы архитектуры Zero Trust, включая постоянную проверку пользователей, многофакторную аутентификацию, сегментацию сети и принцип минимальных привилегий. Особое внимание уделяется преимуществам данной модели в условиях роста киберугроз и развития удаленной работы.
Keywords: information security; Zero Trust; cybersecurity; network protection; authentication.
Ключевые слова: информационная безопасность; Zero Trust; кибербезопасность; защита сетей; аутентификация.
Introduction
Modern organizations actively use cloud technologies, online services, and digital communication systems. As a result, cybersecurity has become one of the most important areas in the IT industry. Companies store a huge amount of confidential information, including financial data, personal information, and trade secrets. At the same time, cybercriminals are constantly developing new methods of attack.
Traditional network security systems are no longer fully effective. Previously, organizations relied primarily on perimeter-based protection. This model assumed that users within the company's network could be trusted. However, the development of remote work and cloud computing has exposed the weaknesses of this approach.
One of the most influential modern cybersecurity concepts is the zero-trust security model. Its main principle is "never trust, always verify" [1]. The purpose of this article is to analyze the principles of the zero-trust architecture and its role in improving network protection.
The Concept of Zero Trust
The zero-trust model was introduced by cybersecurity analyst John Kindrog in 2010. According to this concept, no user or device should automatically access company resources.
Traditional security systems mainly focus on protecting the network environment using firewalls and antivirus software. However, attackers can bypass these protections through phishing attacks, malware, or stolen passwords. Once they are logged into the network, cybercriminals may gain access to sensitive information.
Zero Trust architecture changes this approach by requiring continuous authentication of all users and devices. Every access request must be authenticated and monitored.
The model is built on several principles:
• Continuous authentication;
• Least privilege access;
• Multi-factor authentication;
• Network segmentation.
These practices help organizations reduce the risks of unauthorized access and data breaches.
Main Principles of Zero Trust
Continuous Verification
Continuous authentication
Continuous authentication is a key element of Zero Trust. Users and devices are constantly verified before they are granted access to resources.
Modern systems may analyze:
• User location;
• Device type;
• IP address;
• Login behavior.
For example, if an employee normally logs in from France but suddenly tries to access the system from another country, the system may request additional verification.
This principle helps organizations quickly identify suspicious activity.
Least Privilege Access
The least privilege principle means that employees are granted only the minimum level of access necessary for their job.
For example:
• Accountants should not have access to software development servers;
• Minor employees should not change security settings.
This reduces the damage caused by cyberattacks or human error.
Multi-Factor Authentication
Multi-factor authentication (MFA) requires users to verify their identity using two or more methods.
These methods may include:
• Passwords;
• SMS codes;
• Biometric verification;
• Authentication apps.
Even if attackers steal a password, they cannot easily access the system without a second authentication factor.
Network Segmentation
The Zero Trust architecture also uses network segmentation. Instead of one large network, the infrastructure is divided into smaller segments.
If attackers compromise one segment, they cannot easily move to other parts of the system. This method limits the spread of malware and ransomware attacks.
Advantages and Challenges
Zero Trust offers several important benefits. First, it improves cybersecurity by reducing the risks of unauthorized access. Second, it supports remote work because each connection is authenticated individually. Third, this model improves monitoring and helps security teams quickly detect suspicious behavior.
However, this model also has disadvantages. Implementation may require expensive technologies and qualified cybersecurity professionals. Additional verification procedures can also reduce the cost to the user.
Conclusion
In conclusion, Zero Trust architecture is an effective modern approach to network protection. Unlike traditional perimeter-based systems, Zero Trust assumes that threats may exist both outside and inside the network.
Continuous verification, multi-factor authentication, least privilege access, and network segmentation significantly improve cybersecurity and help organizations protect sensitive information.
As cyber threats continue to grow, Zero Trust may become the standard security model for modern companies and institutions.
References:
- Kindervag J. Build Security Into Your Network’s DNA: The Zero Trust Network Architecture. — Forrester Research, 2010.
- Rose S., Borchert O., Mitchell S., Connelly S. Zero Trust Architecture // National Institute of Standards and Technology (NIST). — 2020.
- Stallings W. Effective Cybersecurity: A Guide to Using Best Practices and Standards. — Boston: Pearson Education, 2019.
- Whitman M., Mattord H. Principles of Information Security. — Boston: Cengage Learning, 2021.

