{"title":"Zero trust using Network Micro Segmentation","authors":"Nabeela I. Sheikh, M. Pawar, Victor Lawrence","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484645","DOIUrl":null,"url":null,"abstract":"Current enterprise infrastructures are undergoing significant security transformations as traditional infrastructures and data centers are being replaced by cloud computing environments hosting dynamic workloads. Current network security best practices are not well suited for traditional data centers where network micro segmentation is required. In this paper, we present a novel network security architecture that supports zero trust approach, based on a concept that inspects network traffic for port and protocol information to allow authorized communication. This approach is demonstrated in a cloud computing data center environment.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Current enterprise infrastructures are undergoing significant security transformations as traditional infrastructures and data centers are being replaced by cloud computing environments hosting dynamic workloads. Current network security best practices are not well suited for traditional data centers where network micro segmentation is required. In this paper, we present a novel network security architecture that supports zero trust approach, based on a concept that inspects network traffic for port and protocol information to allow authorized communication. This approach is demonstrated in a cloud computing data center environment.