1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of a ZT-based ACS of IoT platform in decentralized environments
7 Technical characteristics of a ZT-based ACS of IoT platform in
decentralized environments
7.1 Zero trust principles and zero trust-based access control
7.2 Adaption to decentralized environment
7.3 Independent shared storages for access control information
7.4 Compliance with local and regional data regulations
8 Functional requirements of a ZT-based ACS of IoT platform in
decentralized environments
8.1 Management of zero trust-based access control
8.2 Adaption to decentralized environment
8.3 Independent shared storages for access control information
8.4 Access control for multiple IoT platforms
8.5 Data security
9 Functional architecture and capabilities of a ZT-based ACS of an IoT
platform in decentralized environments
9.1 Trust engines
9.2 Policy engines
9.3 Secured data storages
9.4 Policy administrators
9.5 Cross-platform agents
9.6 Policy enforcement points
9.7 External entities
9.8 Reference points
10 Security consideration
Appendix I – Use cases of a ZT-based ACS of IoT platform in decentralized
environments
I.1 Use case: ZT-based access control for Internet vehicle services
(IVSs) in a standalone platform
I.2 Use case: ZT-based access control for multiple IVSs across
platforms
Appendix II – Security risks and challenges analysis, and zero trust maturity
model of a ZT‑based ACS of an IoT platform in decentralized
environments
II.1 Security risks and challenges to perform zero trust security
II.2 Zero trust maturity model
Bibliography