Information and Communications Technology and Policy ›› 2025, Vol. 51 ›› Issue (1): 46-51.doi: 10.12267/j.issn.2096-5931.2025.01.007
Previous Articles Next Articles
WU Qianlin, KONG Song
Received:
Online:
Published:
Abstract:
With the continuous upgrading of security needs in the process of industrial digitization, the development of zero trust in China has accelerated. This paper first reviews the zero trust policies and standards, and studies how zero trust solves the security problems faced by enterprises in the six areas, namely, identity, terminal, network environment, applications and workloads, data, and security management. Then, based on the investigation on the supply-side zero trust enterprises and the application enterprises in the financial industry in China, this paper forms the supply capability mapping and analyzes the application scenarios and roles of zero trust. Finally, it analyzes how artificial intelligence empowers the development of zero trust.
Key words: zero trust, zero trust standard, zero trust ecology
CLC Number:
TP393.08
WU Qianlin, KONG Song. Research of zero trust development and application[J]. Information and Communications Technology and Policy, 2025, 51(1): 46-51.
Add to citation manager EndNote|Ris|BibTeX
http://ictp.caict.ac.cn/EN/10.12267/j.issn.2096-5931.2025.01.007