ZERO TRUST ARCHITECTURE FOR ENHANCED CYBERSECURITY
Abstract
Information security is threatened by traditional-based security concepts, which are thought to be inadequate and unable to control the dynamics of information system trust. In an effort to bridge the trust gap in information security, a novel framework known as Zero Trust Architecture (ZTA) combines identity-based policies with ongoing authentication and verification. In an effort to bridge the trust gap in an information system, this architecture is based on a number of trust nodes and logical elements. This framework's acceptance is still in its infancy due to a number of incorrect presumptions and conclusions. We make an effort to investigate the framework's complexities and fill up the current knowledge gap. Although we don't criticize other approaches, this article examined the benefits and features of the zero-trust security architecture in an effort to give a general overview of the model and fill the knowledge gap on the efficacy of implementing a zero-trust philosophy. Therefore, in order to establish a zero-trust architecture, organizations need to continuously check and verify that a user and their device have the correct rights and characteristics. It requires the development of a policy that considers user and device risk in addition to compliance or other requirements to be considered before permitting the transaction. In addition to being aware of all their services and privileged accounts, the organization must be able to control what and where they connect. One-time validation is insufficient since user traits and threats can change at any time.
References
- Rebouças Filho, W. L. (2025). The Role of Zero Trust Architecture in Modern Cybersecurity: Integration with IAM and Emerging Technologies. Brazilian Journal of Development, 11(1), e76836-e76836.
- Hubbard, T., Klimavicz, J. F., Wong, S., & Steinhoff, J. C. (2021). Zero trust in a virtual cybersecurity world. The Journal of Government Financial Management, 70(2), 12-19.
- Zanasi, C., Russo, S., & Colajanni, M. (2024). Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Networks, 156, 103414. https://doi.org/10.1016/j.adhoc.2024.103414
- Roy, A., Dhar, A., & Tinny, S. S. (2024). Strengthening IoT Cybersecurity with Zero Trust Architecture: A Comprehensive Review. Journal of Computer Science and Information Technology, 1(1), 25-50.
- Stafford, V. (2020). Zero trust architecture. NIST special publication, 800(207), 800-207.
- Sharma, H. (2022). Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 2(2), 78-91.
- Ogendi, E. G. Leveraging Advanced Cybersecurity Analytics to Reinforce Zero-Trust Architectures within Adaptive Security Frameworks.
- Khan, M. J. (2023). Zero trust architecture: Redefining network security paradigms in the digital age. World Journal of Advanced Research and Reviews, 19(3), 105-116.
- Chokkanathan, K., Karpagavalli, S. M., Priyanka, G., Vanitha, K., Anitha, K., & Shenbagavalli, P. (2024, November). AI-Driven Zero Trust Architecture: Enhancing Cyber-Security Resilience. In 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS) (pp. 1-6). IEEE.
- Kim, Y., Sohn, S. G., Jeon, H. S., Lee, S. M., Lee, Y., & Kim, J. (2024). Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study. KSII Transactions on Internet and Information Systems (TIIS), 18(9), 2665-2691.
- Tiwari, S., Sarma, W., & Srivastava, A. (2022). Integrating Artificial Intelligence with Zero Trust Architecture: Enhancing Adaptive Security in Modern Cyber Threat Landscape. International Journal of Research and Analytical Reviews, 9, 712-728.
- Manda, J. K. (2022). Zero Trust Architecture in Telecom: Implementing Zero Trust Architecture Principles to Enhance Network Security and Mitigate Insider Threats in Telecom Operations. Journal of Innovative Technologies, 5(1).
- Bashir, T. (2024). Zero Trust Architecture: Enhancing cybersecurity in enterprise networks. Journal of Computer Science and Technology Studies, 6(4), 54-59.
- Abbas, G., & Gul, S. (2025). Zero Trust Architecture: Revolutionizing Cybersecurity in the Era of Advanced Threats.
- Patel, R., Müller, K., Kvirkvelia, G., Smith, J., & Wilson, E. (2024). Zero trust security architecture raises the future paradigm in information systems. Informatica and Digital Insight Journal, 1(1), 24-34.
- Alagappan, A., Venkatachary, S. K., & Andrews, L. J. B. (2022). Augmenting Zero Trust Network Architecture to enhance security in virtual power plants. Energy Reports, 8, 1309-1320.
- Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero trust: Applications, challenges, and opportunities.
- Ahmadi, S. (2024). Zero trust architecture in cloud networks: Application, challenges and future opportunities. Journal of Engineering Research and Reports, 26(2), 215-228.
- Rhoads, J., & Smith, A. (2024). Effectiveness of Continuous Verification and Micro-Segmentation in Enhancing Cybersecurity through Zero Trust Architecture
- Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2022). Zero trust architecture (zta): A comprehensive survey. IEEE access, 10, 57143-57179.
