Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{187744,
author = {K. R. Aruna and K. Gomathy and J. Renuga and G. Vasanthasena},
title = {IMPLEMENTING ZERO TRUST ARCHITECTURE IN MULTI-CLOUD ENVIRONMENTS: A FRAMEWORK FOR DYNAMIC, IDENTITY-CENTRIC SECURITY},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {6},
pages = {6891-6898},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=187744},
abstract = {The paradigm of network security has fundamentally shifted with the widespread adoption of cloud computing and remote work, rendering the traditional perimeter-based "castle-and-moat" model obsolete. This paper explores the implementation of Zero Trust Architecture (ZTA) as a critical framework for securing dynamic multi-cloud environments. The core principle of Zero Trust—"never trust, always verify"—mandates that every access request, regardless of its origin, must be authenticated, authorized, and encrypted. We examine the key technological pillars enabling this shift, including robust Identity and Access Management (IAM) with strict enforcement of least-privilege access, comprehensive micro-segmentation to contain lateral movement, and continuous risk assessment based on user, device, and application context. The study highlights the challenges of operationalizing ZTA across heterogeneous cloud platforms, such as policy consistency and visibility gaps. Furthermore, it argues that a successful Zero Trust implementation is not merely a product but a strategic architecture that integrates people, processes, and technology to create a resilient security posture. By adopting this model, organizations can effectively mitigate threats stemming from perimeter erosion, credential theft, and insider risk, thereby securing their digital transformation journey.},
keywords = {Zero Trust Architecture (ZTA), Cloud Security, Identity and Access Management (IAM), Micro-segmentation, Multi-Cloud, Least Privilege Access},
month = {December},
}
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry