IMPLEMENTING ZERO TRUST SECURITY MODEL IN DEVOPS ENVIRONMENTS

Authors

  • Sagar Aghera Author

Abstract

Zero Trust Security Model elements like continuous verification, strict access rules, and proactive anomaly detection are applied to DevOps settings to reduce modern cybersecurity concerns. Access Control, Authentication, and Anomaly Detection Algorithms (ex. Multi-Factor Authentication, Isolation Forest) are evaluated for accuracy, scalability, and security. The comparative analysis highlights strengths and weaknesses, underlining the need for selecting and integrating different strategies in dynamic DevOps processes. Future directions include machine learning anomaly detection, scalable access control, and DevSecOps frameworks for automated security. This research enhances DevOps security resilience and efficiency to protect assets and data from emerging threats.

Downloads

Published

2022-12-20

Issue

Section

Articles

How to Cite

IMPLEMENTING ZERO TRUST SECURITY MODEL IN DEVOPS ENVIRONMENTS. (2022). JOURNAL OF BASIC SCIENCE AND ENGINEERING, 19(1). https://yigkx.org.cn/index.php/jbse/article/view/237