Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{181067,
author = {Harsh Vishal Ghodke and Dr. Prakash Kene},
title = {Zero Trust in Multi Cloud Environments: Challenges, Strategies and Best Practices},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {1},
pages = {3333-3339},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=181067},
abstract = {As more organizations move toward multi
cloud infrastructures to improve scalability and
operational flexibility, they are also encountering a new
set of security challenges. Traditional perimeter-based
security approaches are proving inadequate for
safeguarding data, applications, and user identities
across diverse cloud platforms. In response, the Zero
Trust security model built on the principle of "never
trust, always verify" has gained traction as a robust
framework for securing multi-cloud environments.
However, applying Zero Trust in such settings is not
without its difficulties. Key obstacles include complex
identity
and access management, inconsistent
implementation of security policies across platforms,
limited visibility into cloud activities, and difficulties
meeting regulatory compliance standards.
This paper delves into these challenges and outlines
practical strategies to overcome them. It examines the
role of identity-focused security, micro-segmentation,
Zero Trust Network Access (ZTNA), and centralized
policy control as foundational elements of a Zero Trust
strategy.},
keywords = {Zero Trust Architecture (ZTA), Multi-Cloud Security, Identity and Access Management (IAM), Zero Trust Network Access (ZTNA), Cloud Security Challenges, Least Privilege Access, Micro Segmentation, Threat Detection and Response, Cybersecurity Best Practices, Real-Time Monitoring, Automated Policy Enforcement, Compliance Management, Data Encryption, Endpoint Security, Security Orchestration, Access Control, Cloud Visibility, Risk Management, Cloud Governance.},
month = {June},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry