SSRN 4726625
SSRN 4726625
Article Information Businesses are becoming more interested in developing and testing Large Language Models (LLMs) in their own
Received date : February 12, 2024 settings to support decision-making and growth as a result of the rapid emergence of AI and cloud computing. Here’s the
dilemma, though: to what extent do you believe these models and the data they were trained on? We don’t know the feature
Published date: March 12, 2024
list of an LLM, which presents the first obstacle when discussing trust and the reasons why there should be zero trust.
Although it may seem a bit extreme, this is accurate for two reasons. When it comes to GenAI models nowadays, the more
*Corresponding author multimodal and more capabilities they have, the better. This way of thinking is great for exploring and confirming if GenAI
can address a business problem, but it’s a surefire way to run into trouble when attempting to put things into production
Bibhu Dash, School of Computer and
in an organizational setting. An enterprise cybersecurity architecture known as a zero-trust architecture (ZTA) is built
Information Sciences, University of the on the ideas of zero trust and is intended to stop data breaches, enhance privacy, and restrict internal lateral movement.
Cumberlands, USA This article discusses ZTA, its logical aspects, probable deployment scenarios, AI rules, threats and limitations in order
to provide a detailed understanding of why enterprises must adapt a ZTA framework in a cloud-based environment for AI
model deployment.
DOI: 10.54026/CTES/1058
Introduction
Keywords
Zero Trust, LLM; Black Box; AI-Powered According to the Zero Trust security architecture, before obtaining or keeping access to apps and data, all users - both inside
and outside the company’s network must be validated, given permission, and regularly assessed for security configuration and
framework; PDP; IPP; GDPR; CCPA
posture [1]. Since resources and employees can be situated anywhere, networks can be local, cloud-based, or a combination of
both, Zero Trust assumes that there is no such thing as a normal network edge. In today’s digital age, zero trust is a process that
Distributed under Creative Commons protects data and infrastructure. It addresses modern business issues including ransomware threats, hybrid cloud environments,
and security for remote workers in a new way. Although many providers have endeavored to delineate Zero Trust in their own
CC-BY 4.0
manner, certain established organizations’ guidelines might aid you in harmonizing Zero Trust with your establishment.
In response to the increasing number of high-profile cyber breaches, the US government issued an executive order in May
2021 requiring U.S. Federal Agencies to comply with National Institute of Standards and Technology (NIST) 800-207 as an
essential step for Zero Trust implementation [2,3]. Numerous commercial organizations, government agencies, and vendors
have provided considerable validation and input on the standard, making it the de facto norm for private firms as well.
Zero Trust in cloud as per NIST guidelines [2], follow these 3 characteristics:
a) Ongoing verification: Make sure you always have access to all resources.
b) Restrict ‘blast radius’: Reduce the damage if an insider or external breach occurs.
c) Automate the gathering and reaction of context: For the most correct action, consider behavioral data and obtain
context from the complete IT stack (identity, endpoint, workload, etc.).
d) Real-time data analytics and monitoring: Validate and take real time action on the spot with analytics to safeguard
the IT assemble.
As cloud is everywhere in modern organizations, through cloud-based Zero Trust Architecture (ZTA) implementation,
enterprises may take a more proactive and detailed approach to security. Identity-based access control, continuous authentication,
and micro-segmentation are a few examples of Zero Trust principles that assist enterprises gain better agility and flexibility while
reducing the dangers associated with cloud computing (Figure 1) [4]. In cloud contexts, Zero Trust Architecture is becoming
more and more crucial for several reasons:
a) Distributed Nature: Resources are accessed from a variety of places and devices in cloud settings, which frequently
span numerous regions and data centers. Because of this distributed nature, traditional security methods focused
on the network perimeter become less effective as the boundary grows more porous [3,4].
b) Dynamic Workload Settings: Workloads are spun up and down in response to demand in cloud settings, which are
quite dynamic. This degree of dynamism defies the capabilities of traditional security techniques, which are based
on static network boundaries [5].
c) Expanded Attack Surface: As cloud services are adopted and remote work becomes more common, enterprises now
confront a larger attack surface [5]. Attackers now have greater chances to take advantage of weaknesses and access
cloud resources without authorization.
d) Changing Threat Environment: Attackers’ strategies are getting more complex, and cyberthreats are always
changing. To counter these changing threats, traditional security methods that are predicated on static trust
assumptions are inadequate [6].
How to cite this article: Dash B (2024) Zero-Trust Architecture (ZTA): Designing an AI-Powered Cloud Security Framework for LLMs’ Black Box Problems.
Current Trends in Eng Sci. 4: 1058
e) Data Privacy and Compliance: Organizations are under growing pressure f) Automated Threat Response: By automatically coordinating security
to guarantee the security and privacy of sensitive data due to laws like the alerts, ranking threats, and planning response actions, AI-driven security
General Data Protection Regulation (GDPR) and California Consumer orchestration and automation solutions can expedite incident response
Privacy Act (CCPA). Least privilege access and data encryption are two procedures [3]. This reduces the possible impact on business operations
examples of zero trust concepts that aid firms in meeting these compliance by assisting enterprises in identifying and mitigating security events more
obligations [1,7]. quickly.
Research on “black box” problems in LLMs is ongoing, with the goal of enhancing
the robustness, transparency, and interpretability of the models [9]. Nevertheless,
comprehensive answers to these problems are still elusive, and properly implementing
LLMs necessitates giving these problems considerable thought. Occasionally referred to
as “black box” issues, large language models (LLMs) such as GPT (Generative Pre-trained
Transformer) models might display certain behaviors. This is the reason why:
Citation: Dash B (2024) Zero-Trust Architecture (ZTA): Designing an AI-Powered Cloud Security Framework for LLMs’ Black Box Problems. Current Trends in
Eng Sci. 4: 1058
Page 2/5
may be necessary for this. For instance, dubious protocols like RDP or RPC (Remote Data Security and Encryption
Procedure Call) to the domain controller ought to be restricted to specific credentials
or constantly questioned [22,23]. Over 80% of all attacks entail the exploitation or abuse a) AI-driven Data Classification: Using metadata properties, content,
of credentials within the network [24]. Increased password security, account integrity, and context, you may use AI-driven data classification technologies to
following corporate policies, and avoiding high-risk shadow IT services are all made automatically detect and categorize sensitive data that is stored across
possible with the aid of ZTA (Figure 2). several cloud environments [24].
Figure 2: Design of a basic Zero Trust Access Model. a) Cloud Threat Intelligence Integration: Integration of AI-driven threat
intelligence feeds from various sources can offer thorough insight into
cyberthreats and vulnerabilities impacting multi-cloud settings, facilitating
Designing an AI-Powered Zero Trust Framework proactive threat hunting and incident response. This is known as multi-
cloud threat intelligence integration [2,3].
Working with AI models, particularly LLMs, needs a large amount of data, and we
have no control over what the models use internally. All IT engineers and data scientists b) Cross-Cloud Incident Orchestration: To expedite response times and lessen
are questioning whether the models internally store the data, delete it later, or share it. the impact of security incidents, deploy AI-driven security orchestration and
This is purely a black box to any IT specialist. Hence, creating an AI-driven Zero Trust automation platforms that can coordinate incident response actions across
Framework for cloud settings to work with LLMs necessitates a thorough strategy that various cloud environments, such as alert triaging, threat containment, and
considers the particular difficulties in overseeing security in data sharing across various remediation [3].
cloud platforms [2,25]. Organizations may build a strong Zero Trust Framework for
single or multi-cloud environments that uses AI to improve security, visibility, and Continuous Monitoring and Compliance Assurance
compliance across their cloud deployments by incorporating AI technology into these
essential elements (Figure 3). a) AI-driven Security Analytics: Use AI-driven security analytics tools to
monitor and detect threats continuously by analyzing security logs, events,
Unified Identity and Access Management (UIAM) and telemetry data from various cloud platforms to spot unusual patterns
and signs of compromise [24].
a) Centralized Identity Federation: Unified Identity and Access Management
(UIAM) install a centralized identity federation system to serve as a single b) Cloud Compliance Automation: To guarantee adherence to legal
source of truth for user IDs and access restrictions in all cloud environments. requirements and industry standards, use AI-driven compliance automation
This system should interface with numerous cloud identity providers (IdPs) solutions to automate compliance evaluation and enforcement across
and directories [25]. several cloud environments [27].
Citation: Dash B (2024) Zero-Trust Architecture (ZTA): Designing an AI-Powered Cloud Security Framework for LLMs’ Black Box Problems. Current Trends in
Eng Sci. 4: 1058
Page 3/5
With popularity around ChatGPT, organizations are excited to build and test their
own inhouse GPT models [17]. But considering LLMs black box problems, it needs a
complete strategy to secure Large Language Models (LLMs) in a cloud context, addressing
issues with data privacy, model integrity, access control, and compliance, among other
security problems (Figure 4). When building Zero Trust Architecture in cloud, along with
above points, special security around LLMs in a cloud or multi-cloud environment, keep
the following points in view:
Citation: Dash B (2024) Zero-Trust Architecture (ZTA): Designing an AI-Powered Cloud Security Framework for LLMs’ Black Box Problems. Current Trends in
Eng Sci. 4: 1058
Page 4/5
experience impact, regulatory compliance, scalability, and integration complexity. For 17. Sharma P, Dash B (2023) Impact of big data analytics and ChatGPT on cybersecurity.
enterprises looking to safeguard vital assets, lessen cyber threats, and guarantee data In 2023 4th International Conference on Computing and Communication Systems
privacy in cloud settings, adopting AI-powered ZTA frameworks is essential despite these (I3CS) IEEE pp. 1-6.
obstacles due to the advantages of increased security, agility, and resilience. 18. Wu X, Wu SH, Wu J, Feng L, Tan KC (2024) Evolutionary Computation in the Era
of Large Language Model: Survey and Roadmap.
Acknowledgement
19. Hassija V, Chamola V, Mahapatra A, Singal A, Goel D, et al. (2024) Interpreting
I acknowledge Dr. Sameeh Ullah from Illinois State University for his time and effort black-box models: a review on explainable artificial intelligence. Cognitive
to review this paper and provide his timely feedback to bring this paper to its current Computation 16(1): 45-74.
shape and quality. 20. Saleem M, Warsi MR, Islam S (2023) Secure information processing for multimedia
forensics using zero-trust security model for large scale data analytics in SaaS cloud
References computing environment. Journal of Information Security and Applications 72:
103389.
1. Stafford VA (2020) Zero trust architecture. NIST special publication. 21. Seaman J (2023) Zero Trust Security Strategies and Guideline. In Digital
2. Shastri V (2023) What is ZTNA? Zero Trust Network Access – Crowdstrike. Transformation in Policing: The Promise, Perils and Solutions. Cham: Springer
3. Kerman A, Borchert O, Rose S, Tan A (2020) Implementing a zero-trust International Publishing, pp. 149-168.
architecture. National Institute of Standards and Technology p. 17. 22. Chauhan M, Shiaeles S (2023) An analysis of cloud security frameworks, problems
4. Teerakanok S, Uehara T, Inomata A (2021) Migrating to zero trust architecture: and proposed solutions. Network 3(3): 422-450.
Reviews and challenges. Security and Communication Networks p. 1-10. 23. Pero V, Ekman L (2023) Implementing a Zero Trust Environmentfor an Existing
5. Shastri V (2023) What is ZTNA? Zero Trust Network Access - Crowdstrike. On-premises Cloud Solution.
6. Loftus M, Vezina A, Doten R, Mashatan A (2023) The Arrival of Zero Trust: What 24. Dash B, Ullah S (2024) Quantum-safe: Cybersecurity in the age of Quantum-
Does it Mean? Communications of the ACM 66(2): 56-62. Powered AI. World Journal of Advanced Research and Reviews 21(1): 1555-1563.
7. Kawalkar SA, Bhoyar DB (2024) Design of an Efficient Cloud Security Model 25. Fernandez EB, Brazhuk A (2024) A critical analysis of Zero Trust Architecture
through Federated Learning, Blockchain, AI-Driven Policies, and Zero Trust (ZTA). Computer Standards & Interfaces.
Frameworks. International Journal of Intelligent Systems and Applications in 26. Rodigari S (2023) Performance Analysis of Zero Trust in Cloud Native Systems.
Engineering 12(10s): 378-388. 27. Salminen H (2023) Zero Trust: The Magic Bullet or Devil’s Advocate? In European
8. Grassi L, Recchiuto CT, Sgorbissa A (2023) Sustainable cloud services for verbal Conference on Cyber Warfare and Security 22(1): 678-686.
interaction with embodied agents. Intelligent Service Robotics 16(5): 599-618. 28. Morrow T (2023) Best Practices and Results from Fall 2022 SEI Zero Trust Industry
9. Brożek B, Furman M, Jakubiec M, Kucharzyk B (2023) The black box problem Day.
revisited. Real and imaginary challenges for automated legal decision making. 29. Kujo J (2023) Implementing Zero Trust Architecture for Identities and Endpoints
Artificial Intelligence and Law pp. 1-14. with Microsoft tools.
10. Madsen T (2024) Zero-trust–An Introduction. CRC Press. 30. Gai K, She Y, Zhu L, Choo KKR, Wan Z (2023) A blockchain-based access control
11. Kumar A, Singh S, Murty SV, Ragupathy S (2024) The Ethics of Interaction: scheme for zero trust cross-organizational data sharing. ACM Transactions on
Mitigating Security Threats in LLMs. Internet Technology 23(3): 1-25.
12. Wrana M, Barradas D, Asokan N (2024) The Spectre of Surveillance and Censorship 31. Gao S, Gao AK (2023) On the Origin of LLMs: An Evolutionary Tree and Graph for
in Future Internet Architectures. 15,821 Large Language Models.
13. Tsai YHH, Talbott W, Zhang J (2024) Efficient Non-Parametric Uncertainty 32. Al Shehhi F, Otoum S (2023) On the Feasibility of Zero-Trust Architecture in
Quantification for Black-Box Large Language Models and Decision Planning. Assuring Security in Metaverse. In 2023 International Conference on Intelligent
14. Michaud EJ, Liao I, Lad V, Liu Z, Mudide A, et al. (2024) Opening the AI black box: Metaverse Technologies & Applications (iMETA). IEEE pp. 1-8.
program synthesis via mechanistic interpretability. 33. Syed NF, Shah SW, Shaghaghi A, Anwar A, Baig Z, et al. (2022) Zero trust
15. Wang Y, Ma X, Chen W (2023) Augmenting black-box llms with medical textbooks architecture (zta): A comprehensive survey. IEEE Access 10: 57143-57179.
for clinical question answering. 34. Feng X, Hu S (2023) Cyber-Physical Zero Trust Architecture for Industrial Cyber-
16. Cheng J, Liu X, Zheng K, Ke P, Wang H, et al. (2023) Black-box prompt optimization: Physical Systems. IEEE Transactions on Industrial Cyber-Physical Systems 1: 394-
Aligning large language models without model training. 405.
Citation: Dash B (2024) Zero-Trust Architecture (ZTA): Designing an AI-Powered Cloud Security Framework for LLMs’ Black Box Problems. Current Trends in
Eng Sci. 4: 1058
Page 5/5