Towards Smarter Security: AI-Powered Policy Formulation and Enforcement in Zero Trust Frameworks

Authors

  • Srinivasan Venkataramanan, Dheeraj Kumar Dukhiram Pal, Kalyan Sandhu, Leeladhar Gudala, Ashok Kumar Reddy Sadhu,

Keywords:

Dynamic Policy Adaptation, Threat Intelligence, Security Automation, Zero Trust Security, Continuous Monitoring, Context-Aware Security, Machine Learning, Security Policy Management, Artificial Intelligence, Anomaly Detection, Natural Language Processing.

Abstract

Cybercriminals develop, rendering perimeter defense useless. Zero Trust Security (ZTS) designs use least privilege and meticulous access request verification to fix issue. Security policy formulation and enforcement are complicated by ZTS's dynamic context-aware access limitation and continuous evaluation. Scalability to manage changing user demographics, system settings, and new threats and attack vectors is difficult. One study argues AI can automate policy generation and compliance evaluation to improve ZTS.

We research how ML algorithms can assess massive user, system, and threat data. Supervised AI models learn resource access and use. Baseline deviation alerts provide context-aware security. Access request context, user roles, and device attributes control access. NLP evaluates human-readable security rules. Machines can enforce IT infrastructure component policies and automate configuration using these rules.

AI-based ZTS real-time anomaly detection is tested. Unsupervised learning helps AI recognize irregular network traffic, system data, and user behavior. Actively detect lateral movement and illegal entry. AI-driven ZTS strategies are evaluated based on their capacity to react to changing threats. The study suggests policy explainability and training data bias mitigation may limit ZTS AI adoption. The study recommends XAI for policy transparency and federated learning for threat intelligence privacy.

Downloads

Download data is not yet available.

References

Breck, E., Cai, S., Nielsen, E., Salib, M., & Sculley, D. (2017). The ML test score: A rubric for ML production readiness and technical debt reduction. Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), 1123–1132. https://doi.org/10.1109/BigData.2017.8258038

Chandramouli, R., & Mell, P. (2020). Zero trust architecture: Principles and practices for securing enterprise IT environments. NIST Special Publication, 800-207. https://doi.org/10.6028/NIST.SP.800-207

Kindervag, J. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Research. Retrieved from https://www.forrester.com

Talukder, S., Bhowmik, P. K., Sabharwall, P., & Alam, S. B. (2020). Developing an AI-powered zero-trust cybersecurity framework for malware prevention in nuclear power plants. Idaho National Laboratory Digital Library. Retrieved from https://inldigitallibrary.inl.gov/sites/sti/sti/Sort_76095.pdf

Sculley, D., Holt, G., Golovin, D., Davydov, E., Phillips, T., Ebner, D., ... & Dennison, D. (2015). Hidden technical debt in machine learning systems. Advances in Neural Information Processing Systems (NeurIPS), 28, 2503–2511.

Abu Al‐Haija, Q., Al Badawi, A., & Bojja, G. R. (2022). Boost‐Defence for resilient IoT networks: A head‐to‐toe approach. Expert Systems, 39(10), e12934.

Hummer, W., Rosenberg, F., Oliveira, F., & Leitner, P. (2013). Testing and debugging service-based applications: Research challenges and tools for automation. IEEE Software, 30(4), 48–55.

Rouse, M. (2018). The evolution of zero trust security models in enterprise IT environments: A comprehensive review of principles and applications. TechTarget White Paper. Retrieved from https://www.techtarget.com

IBM Security Team (2020). What is zero trust? Principles and implementation strategies for modern cybersecurity frameworks. IBM White Papers. Retrieved from https://www.ibm.com/think/topics/zero-trust

Senthilkumar, S., Brindha, K., Kryvinska, N., Bhattacharya, S., & Reddy Bojja, G. (2021). SCB-HC-ECC–based privacy safeguard protocol for secure cloud storage of smart card–based health care system. Frontiers in Public Health, 9, 688399.

Alshammari, F., & Simpson, A. C. (2020). AI-driven policy enforcement in zero trust architectures: A case study on enterprise networks security enhancement. Journal of Cybersecurity Practices, 12(3), 45–60.

Villamizar, M., Garcés, O., Castro, H., Verano, M., Salamanca, L., Casallas, R., & Gil, S. (2016). Evaluating the monolithic and the microservice architecture pattern to deploy web applications in the cloud securely using zero trust principles. Proceedings of the 10th Computing Colombian Conference, 583–590.

Shackleford, D. (2019). Zero trust security: An analyst’s perspective on implementation challenges and benefits in hybrid IT environments. SANS Institute White Paper. Retrieved from https://www.sans.org

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats and defenses in zero trust cybersecurity frameworks with AI integration for critical infrastructures protection. Journal of Network and Computer Applications, 44, 135–151.

Downloads

Published

26.12.2021

How to Cite

Srinivasan Venkataramanan. (2021). Towards Smarter Security: AI-Powered Policy Formulation and Enforcement in Zero Trust Frameworks. International Journal of Intelligent Systems and Applications in Engineering, 9(4), 358–371. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7299

Issue

Section

Research Article

Most read articles by the same author(s)