Articles
| Open Access |
https://doi.org/10.55640/
Zero Trust Architecture as a Socio-Technical Security Paradigm: Integrating Identity-Centric Control, Secure Messaging Protocols, and Human Factors
Luka Petrovic , Department of Computer and Information Science, University of Ljubljana SloveniaAbstract
The accelerating digitization of organizational infrastructures, combined with the erosion of traditional network boundaries, has rendered perimeter-based security models increasingly ineffective. In response, Zero Trust Architecture (ZTA) has emerged as a dominant paradigm advocating continuous verification, least-privilege access, and strict identity-centric enforcement mechanisms. However, despite its conceptual clarity and growing institutional adoption, Zero Trust remains unevenly implemented, often narrowly interpreted as a technological solution rather than a comprehensive socio-technical security transformation. This article presents an extensive, theory-driven examination of Zero Trust Architecture by synthesizing foundational Zero Trust literature with research on secure messaging protocols, software-defined perimeters, and human-centered security challenges such as security fatigue and authentication usability. Drawing strictly from the provided corpus of standards documents, industrial frameworks, and empirical studies, this research reconceptualizes Zero Trust as an integrated ecosystem that unifies protocol-level trust negotiation, identity-aware network access, and user experience considerations. The methodology adopts a qualitative analytical approach grounded in comparative framework analysis, conceptual mapping, and interpretive synthesis of existing standards and peer-reviewed findings. The results demonstrate that successful Zero Trust implementation depends not only on architectural enforcement but also on adaptive authentication workflows, secure information exchange mechanisms such as XMPP-based security signaling, and organizational sensitivity to human cognitive load. The discussion critically interrogates prevailing assumptions within Zero Trust discourse, highlights structural and behavioral limitations, and proposes directions for future research emphasizing interoperability, automation, and resilience against security fatigue. By positioning Zero Trust as a dynamic governance model rather than a static control framework, this article contributes a holistic perspective essential for both academic inquiry and large-scale operational deployment
Keywords
Zero Trust Architecture, Software Defined Perimeter, Security Fatigue
References
Balaouras, S. The Business of Zero Trust Security. Forrester.
Cam-Winget, N., Appala, S., Pope, S., & Saint-Andre, P. (2019). Using Extensible Messaging and Presence Protocol (XMPP) for Security Information Exchange. Internet Engineering Task Force RFC 8600. https://doi.org/10.17487/RFC8600
Caron, G. (2019). Zero trust in an all too trusting world. Cyber Security: A Peer-Reviewed Journal, 3(3), 256–264.
Carter, B., et al. (2025). Zero Trust deployment for technology pillars. Microsoft Corporation.
Cloud Security Alliance. (2014). SDP Specification 1.0. Software Defined Perimeter Working Group.
Cloud Security Alliance. Zero Trust Advancement Center. https://cloudsecurityalliance.org/zt
Cloudflare. (2024). The Business Case for Zero Trust.
DeCusatis, C., Liengtiraphan, P., & Sager, A. (2017). Zero trust cloud networks using transport access control and high availability optical bypass switching. Advances in Science Technology and Engineering Systems Journal, 3, 30–35.
DeCusatis, C., Liengtiraphan, P., Sager, A., &Pinelli, M. (2016). Implementing zero trust cloud networks with transport access control and first packet authentication. IEEE International Conference on Smart Cloud.
Kerman, A. (2020). Zero Trust Cybersecurity: Never Trust, Always Verify. NIST Taking Measure Blog.
Kindervag, J. (2010). No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Forrester Research.
Kindervag, J., &Balaouras, S. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Research.
McQuaid, A., MacDonald, N., Watts, J., & Kaur, R. (2023). Market Guide for Zero Trust Network Access. Gartner.
National Security Agency. (2021). Embracing a Zero Trust Security Model.
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture. NIST Special Publication 800-207.
Stanton, B., Theofanos, M. F., Spickard Prettyman, S., & Furman, S. (2016). Security fatigue. IT Professional, 18(5), 26–32.
Strouble, D., Shechtman, G. M., & Alsop, A. S. (2009). Productivity and usability effects of using a two-factor security system. SAIS 2009 Proceedings.
Weidman, J., &Grossklags, J. (2017). I Like It but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. Proceedings of the Annual Computer Security Applications Conference.
Article Statistics
Downloads
Copyright License
Copyright (c) 2026 Luka Petrovic

This work is licensed under a Creative Commons Attribution 4.0 International License.