Table of Contents

 1     Scope         
 2     References              
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation        
 4     Abbreviations and acronyms          
 5     Conventions           
 6     Overview of a ZT-based ACS of IoT platform in decentralized environments           
 7     Technical characteristics of a ZT-based ACS of IoT platform in decentralized environments          
        7.1     Zero trust principles and zero trust-based access control    
        7.2     Adaption to decentralized environment         
        7.3     Independent shared storages for access control information             
        7.4     Compliance with local and regional data regulations              
 8     Functional requirements of a ZT-based ACS of IoT platform in decentralized environments           
        8.1     Management of zero trust-based access control       
        8.2     Adaption to decentralized environment         
        8.3     Independent shared storages for access control information             
        8.4     Access control for multiple IoT platforms      
        8.5     Data security
 9     Functional architecture and capabilities of a ZT-based ACS of an IoT platform in decentralized environments    
        9.1     Trust engines
        9.2     Policy engines             
        9.3     Secured data storages            
        9.4     Policy administrators
        9.5     Cross-platform agents            
        9.6     Policy enforcement points    
        9.7     External entities         
        9.8     Reference points       
10     Security consideration     
Appendix I – Use cases of a ZT-based ACS of IoT platform in decentralized environments    
        I.1     Use case: ZT-based access control for Internet vehicle services (IVSs) in a standalone platform    
        I.2     Use case: ZT-based access control for multiple IVSs across platforms            
Appendix II – Security risks and challenges analysis, and zero trust maturity model of a ZT‑based ACS of an IoT platform in decentralized environments    
       II.1     Security risks and challenges to perform zero trust security 
       II.2     Zero trust maturity model       
Bibliography