Revisión de marco Zero Trust en seguridad de la información sanitaria: aspectos claves y mejoras

Autores/as

DOI:

https://doi.org/10.64424/rcu42202586

Palabras clave:

confianza cero, salud, ciberseguridad, evaluación, protección de datos

Resumen

La rápida digitalización del sector salud con historias clínicas electrónicas, telemedicina y dispositivos conectados ha mejorado la atención, pero multiplicado los vectores de riesgo para la información clínica sensible. Hospitales y centros de salud son objetivos de ciberataques (acceso no autorizado, robo de datos, ransomware) que afectan la confidencialidad, integridad y continuidad asistencial. Ante las limitaciones de la seguridad perimetral, la arquitectura Zero Trust (ZTA) propone “nunca confiar, siempre verificar”, verificación continua, principio de menor privilegio y segmentación granular para reducir la superficie de ataque. Para evaluar su aplicabilidad, realizamos una revisión sistemática (2020–2025) siguiendo PRISMA: búsquedas en bases indexadas, selección con criterios predefinidos y análisis cualitativo-comparativo de propuestas y evaluaciones empíricas. La revisión mostró avances consistentes en autenticación multifactor, microsegmentación y trazabilidad, con evaluaciones que reportaron eficacias superiores al 90% en escenarios controlados; sin embargo, emergen limitaciones en interoperabilidad, latencia operacional y ausencia de métricas estandarizadas. Concluimos que ZTA ofrece mejoras significativas para la protección de la información sanitaria, aunque su adopción efectiva requiere estandarización de métricas, pruebas en entornos clínicos reales y soluciones para interoperabilidad y latencia.

Citas

Adahman, Z., Malik, A. W., & Anwar, Z. (2022). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122, 102911. https://doi.org/10.1016/j.cose.2022.102911

Ahmadi, S. (2025). Autonomous Identity-Based Threat Segmentation for Zero Trust Architecture. Cyber Security And Applications, 100106. https://doi.org/10.1016/j.csa.2025.100106

Ahmed, S., Shihab, I. F., & Khokhar, A. (2025). Quantum-driven zero trust architecture with dynamic anomaly detection in 7G technology: a neural network approach. Measurement: Digitalization, 2–3(100005), 100005. https://doi.org/10.1016/j.meadig.2025.100005

Aleisa, M. A. (2025). Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments. IEEE Access, 1. https://doi.org/10.1109/access.2025.3529309

Alnaim, A. K. (2025). Adaptive Zero Trust Policy Management Framework in 5G Networks. Mathematics, 13(9), 1501. https://doi.org/10.3390/math13091501

Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K. U., & Hamid, Y. (2024). A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model. Sensors, 24(4), 1328. https://doi.org/10.3390/s24041328

Edo, O. C., Tenebe, T., Etu, E., Ayuwu, A., Emakhu, J., & Adebiyi, S. (2022). Zero Trust Architecture: Trend and Impact on Information Security. International Journal Of Emerging Technology And Advanced Engineering, 12(7), 140-147. https://doi.org/10.46338/ijetae0722_15

Gambo, M., Almulhem A. (2025). Zero Trust Architecture: A Systematic Literature Review. https://doi.org/10.48550/arXiv.2503.11659

George, N. A. A., Ogundipe, N. A. O., & Bello, N. A. B. (2025). Cybersecurity In healthcare systems: safeguarding electronic health records (EHRs) and medical devices against emerging cyber threats. World Journal Of Advanced Research And Reviews, 25(2), 2249-2262. https://doi.org/10.30574/wjarr.2025.25.2.0592

HIPAA Journal. (30 de enero de 2025). 2024 Healthcare Data Breach Report. https://www.hipaajournal.com/2024-healthcare-data-breach-report/

HIPAA Journal. (30 de diciembre de 2021). Largest Healthcare Data Breaches of 2021. https://www.hipaajournal.com/largest-healthcare-data-breaches-of-2021/

KPMG. (2015). HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increassed Capabilities. https://kpmg.com/

Kaur, N., Mittal, A., Lilhore, U. K., Simaiya, S., Dalal, S., Saleem, K., & Ghith, E. S. (2025). Securing fog computing in healthcare with a zero-trust approach and blockchain. EURASIP Journal On Wireless Communications And Networking, 2025(1). https://doi.org/10.1186/s13638-025-02431-6

Koralla, N. L. N. G. (2025). Zero Trust Architecture: A Comprehensive Framework for Modern Data Security. International Journal Of Advanced Research In Science Communication And Technology, 390-405. https://doi.org/10.48175/ijarsct-24449

Nadrag P. (3 de febrero de 2021). Stolen Patient Records a Hot Commodity on the Dark Web. https://capsuletech.com/blog/stolen-patient-records-a-hot-commodity-on-the-dark-web

Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., Shamseer, L., Tetzlaff, J. M., Akl, E. A., Brennan, S. E., Chou, R., Glanville, J., Grimshaw, J. M., Hróbjartsson, A., Lalu, M. M., Li, T., Loder, E. W., Mayo-Wilson, E., McDonald, S., . . . Alonso-Fernández, S. (2021). Declaración PRISMA 2020: una guía actualizada para la publicación de revisiones sistemáticas. Revista Española de Cardiología, 74(9), 790-799.

https://doi.org/10.1016/j.recesp.2021.06.016

Peepliwal, A. K., Pandey, H. M., Prakash, S., Chowhan, S. S., Kumar, V., Sharma, R., & Mahajan, A. (2024). A Prototype Model of Zero Trust Architecture Blockchain with EigenTrust-Based Practical Byzantine Fault Tolerance Protocol to Manage Decentralized Clinical Trials. Blockchain Research And Applications, 100232. https://doi.org/10.1016/j.bcra.2024.100232

Raheman, F. (2024). From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security. Journal Of Computer And Communications, 12(03), 252-282. https://doi.org/10.4236/jcc.2024.123016

Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207

Saleh, A. M. S. (2024). Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review. Blockchain Research And Applications, 5(3), 100193. https://doi.org/10.1016/j.bcra.2024.100193

Thantharate, P., & Thantharate, A. (2023). ZeroTrustBlock: Enhancing Security, Privacy, and Interoperability of Sensitive Data through ZeroTrust Permissioned Blockchain. Big Data And Cognitive Computing, 7(4), 165. https://doi.org/10.3390/bdcc7040165

Tomlinson, E. W., Abrha, W. D., Kim, S. D., & Ortega, S. A. (2024). Cybersecurity Access Control: Framework Analysis in a Healthcare Institution. Journal Of Cybersecurity And Privacy, 4(3), 762-776. https://doi.org/10.3390/jcp4030035

Wang, F., Gai, Y., & Zhang, H. (2024). Blockchain user digital identity big data and information security process protection based on network trust. Journal Of King Saud University - Computer And Information Sciences, 36(4), 102031. https://doi.org/10.1016/j.jksuci.2024.102031

Zakhmi, K., Ushmani, A., Mohanty, M. R., Agrawal, S., Banduni, A., & Kakatum, S. R. (2025). Evolving Zero Trust Architectures for AI-Driven Cyber Threats in Healthcare and Other High-Risk Data Environments: A Systematic Review. Cureus. https://doi.org/10.7759/cureus.85446

Mohile, N. K. (2025). Securing the healthcare ecosystem: Zero trust architecture protecting patient data across multiple access points. World Journal Of Advanced Engineering Technology And Sciences, 15(3), 371-378. https://doi.org/10.30574/wjaets.2025.15.3.0563

Sood, N., Parlapalli, R., Sharma, P., & Kashyap, R. (2024). Application of zero trust model in preventing medical errors. Frontiers In Health Services, 4. https://doi.org/10.3389/frhs.2024.1453804

Saha, N. S. (2025). Zero-trust database systems: The new frontier in data security. World Journal Of Advanced Research And Reviews, 26(1), 829-841. https://doi.org/10.30574/wjarr.2025.26.1.1112

Publicado

2025-09-25