Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2025, Vol. 51 ›› Issue (1): 46-51.doi: 10.12267/j.issn.2096-5931.2025.01.007

Previous Articles     Next Articles

Research of zero trust development and application

WU Qianlin, KONG Song   

  1. Cloud Computing & Big Data Research Institute, China Academy of Information and Communications Technology, Beijing 100191,China
  • Received:2024-07-08 Online:2025-01-25 Published:2025-02-14

Abstract:

With the continuous upgrading of security needs in the process of industrial digitization, the development of zero trust in China has accelerated. This paper first reviews the zero trust policies and standards, and studies how zero trust solves the security problems faced by enterprises in the six areas, namely, identity, terminal, network environment, applications and workloads, data, and security management. Then, based on the investigation on the supply-side zero trust enterprises and the application enterprises in the financial industry in China, this paper forms the supply capability mapping and analyzes the application scenarios and roles of zero trust. Finally, it analyzes how artificial intelligence empowers the development of zero trust.

Key words: zero trust, zero trust standard, zero trust ecology

CLC Number: