Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{188749,
author = {Jatin Kumar and Dr. Shweta Sinha},
title = {Zero Trust Security Model in Cybersecurity Today: Architectures, Operations and Implementation Strategies for Zero Trust},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {7},
pages = {3318-3325},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=188749},
abstract = {The extended growth of distributed computing structures, cloud infrastructure and remote work ecosystems have nearly fundamentally challenged the efficacy of traditional, perimeter-based security structures. This manuscript is a thorough discussion of Zero Trust Architecture (ZTA), which is a revolutionary cybersecurity paradigm that has replaced the assumption of implicit trust within network boundaries with constant verification and granular access control. Through a systematic examination of architectural elements, how algorithms and workflows operate and implementation frameworks, the current research work combines current academic knowledge and industry practices regarding ZTA adoption. The investigation's effectiveness is assessed in terms of ZTA's mitigation of insider threats, lateral movement prevention and attack surface reduction in a variety of organizational sets. Further, this manuscript provides a critical assessment of the implementation challenges, such as the constraints related to scalability, implementation and integration complexities with legacy systems, and consideration of regulatory compliance. The results show that mature deployments of Zero Trust systems, combined with artificial intelligence-based abnormal behavior detection and machine learning-based passive learning systems enhance the ability in critically important areas of cyber security, such as detection and neutralization of threats, for the enterprise. Future research paths (focuses on rare areas for ZTA development) To extend ZTA alongside its combined usage with blockchain-based solutions for identity management or federated learning architectures and new kinds of authentication for distributed ecosystems. In sum, this investigation strives to fill in the gap between theoretical constructs for Zero Trust and pragmatic strategies for implementation in the enterprise.},
keywords = {Zero Trust Architecture, Identity and Access Management, Micro – Segmentation, Continuous Verification, Least Privilege Access, Behavioral Analytics, Policy Enforcement, Cloud Security, Network Segmentation, Cybersecurity Framework},
month = {December},
}
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry