{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T05:49:36Z","timestamp":1695275376371},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11623-023-1836-3","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:01:46Z","timestamp":1695200506000},"page":"641-647","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Macht Zero Trust wirklich sicher?"],"prefix":"10.1007","volume":"47","author":[{"given":"Thomas","family":"Milde","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"1836_CR1","unstructured":"Department of Defense (DoD) Zero Trust Reference Architecture; https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/(U)ZT_RA_v1.1(U)_Mar21.pdf (Datum des Zugriffs: 24.02.2023)"},{"key":"1836_CR2","unstructured":"Security-Richtlinie \u201cMoving the U.S. Government Toward Zero Trust Cybersecurity Principles\u201d; https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/01\/M-22-09.pdf (Datum des Zugriffs: 24.02.2023)"},{"key":"1836_CR3","unstructured":"Privacy and Security Assessment Verfahren; https:\/\/www.telekom.com\/de\/konzern\/datenschutz-und-sicherheit\/news\/privacy-and-security-assessment-verfahren-342724 (Datum des Zugriffs: 24.02.2023)"},{"key":"1836_CR4","unstructured":"Stand der Technik in der IT-Sicherheit; https:\/\/www.teletrust.de\/publikationen\/broschueren\/stand-der-technik\/ (Datum des Zugriffs: 24.02.2023)"},{"key":"1836_CR5","unstructured":"Process Framework eTOM; https:\/\/www.tmforum.org\/oda\/business\/process-framework-etom\/ (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR6","unstructured":"Duden f\u00fcr ausgew\u00e4hlte Definitionen; https:\/\/www.duden.de\/ (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR7","unstructured":"Informationssicherheits-Management Leitfaden f\u00fcr Praktiker und Begleitbuch zur CISM-Zertifizierung; ISBN: 978-3-662-49166-9, Springer Verlag Xpert.press, 2016"},{"key":"1836_CR8","unstructured":"Handschriftliche Aufzeichnungen aus dem Best Practice Meeting \u201eZero Trust\u201c, Nieders\u00e4chsisches Ministerium f\u00fcr Inneres und Sport, Wirtschaftsschutz vom 09.06.2023"},{"key":"1836_CR9","unstructured":"Zero Trust Maturity Model; April 2023 Version 2.0 Cybersecurity and Infrastructure Security Agency Cybersecurity Division; https:\/\/www.cisa.gov\/zero-trust-maturity-model (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR10","unstructured":"NIST White Paper. Planning for a Zero Trust Architecture: A Planning Guide for Federal Administrators. https:\/\/csrc.nist.gov\/publications\/detail\/white-paper\/2022\/05\/06\/planning-for-a-zero-trust-architecture\/final (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR11","unstructured":"Implementing a Zero Trust Architecture, https:\/\/www.nccoe.nist.gov\/projects\/implementing-zero-trust-architecture (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR12","doi-asserted-by":"crossref","unstructured":"Zero Trust Architecture, NIST Special Publication 800-207, https:\/\/doi.org\/10.6028\/NIST.SP.800-207 (Datum des Zugriffs: 18.06.2023)","DOI":"10.6028\/NIST.SP.800-207"},{"key":"1836_CR13","unstructured":"A Zero Trust Architecture Model 3 for Access Control in Cloud-Native 4 Applications in Multi-Location 5 Environments, NIST Special Publication 1 NIST SP 800-207A ipd, https:\/\/doi.org\/10.6028\/NIST.800-207A.ipd (Datum des ZTugriffs: 18.06.2023)"},{"key":"1836_CR14","unstructured":"Zero Trust as an Essential Security Approach, https:\/\/www.isaca.org\/resources\/ebook\/zero-trust-as-an-essential-security-approach (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR15","unstructured":"Implementing a Zero Trust Architecture; NIST SP 1800-35A: Executive Summary; https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2022-12\/zta-nist-sp-1800-35a-preliminary-draft-2.pdf (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR16","unstructured":"Implementing a Zero Trust Architecture; NIST SP 1800-35B: Approach, Architecture, and Security Characteristics; https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2022-12\/zta-nist-sp-1800-35b-preliminary-draft-2.pdf (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR17","unstructured":"Implementing a Zero Trust Architecture; NIST SP 1800-35C: How-To Guides; https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2022-12\/zta-nist-sp-1800-35c-preliminary-draft-2.pdf (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR18","unstructured":"Implementing a Zero Trust Architecture; NIST SP 1800-35D: Functional Demonstrations (2nd Preliminary Draft); https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2022-12\/zta-nist-sp-1800-35d-preliminary-draft-2.pdf (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR19","unstructured":"Implementing a Zero Trust Architecture; NIST SP 1800-35E: Risk and Compliance Management (Preliminary Draft); https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2022-12\/zta-nist-sp-1800-35e-preliminary-draft.pdf (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR20","unstructured":"Antworten des Bundesamtes f\u00fcr Sicherheit in der Informationstechnik (BSI); Fragenkatalog zur \u00d6ffentlichen Anh\u00f6rung des Ausschusses f\u00fcr Digitales am 25.01.2023 \u201eCybersicherheit \u2013 Zust\u00e4ndigkeiten und Instrumente in der Bundesrepublik Deutschland\u201c; https:\/\/www.bundestag.de\/resource\/blob\/931064\/6b36eb5d822dd6aa70a9a4b13b546040\/Stellungnahme-BSI-data.pdf (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR21","unstructured":"Betriebsverfassungsgesetz, \u00a7 87 Abs. 1, Nr.\u00a06 Mitbestimmungsrechte des Betriebsrates; https:\/\/www.gesetze-im-internet.de\/betrvg\/__87.html (Datum des Zugriffs: 24.06.2023)"},{"key":"1836_CR22","unstructured":"STEP-Analyse; https:\/\/de.wikipedia.org\/wiki\/STEP-Analyse#PESTLE (Datum des Zugriffs: 18.06.2023)"},{"key":"1836_CR23","unstructured":"Department of Defense (DoD): Zero Trust Reference Architecture Version 2.0, July 2022; Prepared by the Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team; https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/(U)ZT_RA_v2.0(U)_Sep22.pdf (Datum des Zugriffs: 22.06.2023)"},{"key":"1836_CR24","unstructured":"Deutsche Telekom AG, Privacy and Security Assessment Verfahren, technische Sicherheitsanforderungen; https:\/\/www.telekom.com\/de\/konzern\/datenschutz-und-sicherheit\/news\/privacy-and-security-assessment-verfahren-342724 (Datum des Zugriffs: 23.06.2023)"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1836-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1836-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1836-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:36:12Z","timestamp":1695202572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1836-3"}},"subtitle":["...und wenn ja, um welchen Preis?"],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":24,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1836"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1836-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,20]]},"assertion":[{"value":"20 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}