A zero trust architecture for health information systems

被引:1
|
作者
Edo, Onome Christopher [1 ]
Ang, David [1 ]
Billakota, Praveen [1 ]
Ho, Johnny C. [2 ]
机构
[1] Auburn Univ, Dept Informat Syst, 7400 East Dr, Montgomery, AL 36117 USA
[2] Columbus State Univ, Turner Coll Business, Dept Management & Mkt, Columbus, GA 31907 USA
关键词
ZeroTrust; Healthcare; Security; Patient; Records; Systems;
D O I
10.1007/s12553-023-00809-4
中图分类号
R-058 [];
学科分类号
摘要
BackgroundAdvances in technology have birthed a new dimension to managing patient healthcare data from a brick-and-mortar principle to a digitized phase, while this new paradigm is appraised for its simplicity and efficiency, a critical subject of concern is system vulnerability, with the prevalence of insider attack and recurrent data breaches in the healthcare sector, a more nuanced approach is required to close the insider vulnerability incidences. Although several models have been proposed such as blockchain, biometrics, and firewalls, insider threats continue to gain momentum. Hence the adoption of the Zero Trust Model seeks to pacify these loopholes.MethodsZero Trust model is founded on an access policy based on context and continuous user and device authentication and verification. To block lateral movement in system architecture, the ZTA proposes deduction engines as a panacea to patient data security.ResultsPrior and current studies have suggested a more technical principle and philosophy in managing and securing patient data, the ZTA has been adopted in other domains and has remained an effective countermeasure in closing the data vulnerability gap. Our model is designed with a full-scale ZTA framework and as such combats the information security gaps.ConclusionA new architecture for data security is proposed, and insight was drawn from the ZTA principle, with a combination of several technology tools, The adoption of this framework will help to mitigate the current lapses and provide a gateway to ZTA adoption.
引用
收藏
页码:189 / 199
页数:11
相关论文
共 50 条
  • [1] A zero trust architecture for health information systems
    Onome Christopher Edo
    David Ang
    Praveen Billakota
    Johnny C. Ho
    [J]. Health and Technology, 2024, 14 : 189 - 199
  • [2] An Interoperable Zero Trust Federated Architecture for Tactical Systems
    Poirrier, Alexandre
    Cailleux, Laurent
    Clausen, Thomas Heide
    [J]. MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [3] Information Security Architecture: From Access Paths to Zero Trust
    Ross, Steven J.
    [J]. ISACA Journal, 2024, 2 : 3 - 5
  • [4] Zero Trust Architecture Patterns for Cyber-Physical Systems
    Hasan S.
    Amundson I.
    Hardin D.
    [J]. SAE International Journal of Advances and Current Practices in Mobility, 2023, 5 (05): : 1919 - 1931
  • [5] The Inhibitors to Zero Trust Architecture
    Ross, Steven J.
    [J]. ISACA Journal, 2024, 3 : 3 - 5
  • [6] Optimization Design of Zero Trust Network Architecture for New Power Systems
    Bin, Dongmei
    Ming, Shaofeng
    Yang, Chunyan
    Fu, Hua
    Ling, Ying
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 282 - 286
  • [7] Zero Trust Architecture Approach for Developing Mission Critical Embedded Systems
    Vai, Michael
    Whelihan, David
    Simpson, Eric
    Kava, Donato
    Lee, Alice
    Nguyen, Huy
    Hughes, Jeffrey
    Torres, Gabriel
    Lim, Jeffery
    Nahill, Ben
    Khazan, Roger
    Schneider, Fred
    [J]. 2023 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE, HPEC, 2023,
  • [8] Trust Information-Based Privacy Architecture for Ubiquitous Health
    Ruotsalainen, Pekka Sakari
    Blobel, Bernd
    Seppala, Antto
    Nykanen, Pirkko
    [J]. JMIR MHEALTH AND UHEALTH, 2013, 1 (02):
  • [9] Zero Trust Architecture: Risk Discussion
    Levine, Alan
    Tucker, Brett Alan
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [10] Zero Trust Security in the Mist Architecture
    Uehara, Minoru
    [J]. COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2021, 2021, 278 : 185 - 194