Articles | Open Access | https://doi.org/10.55640/

Implementing Zero Trust Architecture: Modern Approaches to Secure Enterprise Networks

Gaurav Malik , Associate Information Security Manager, The Goldman Sachs Group, Inc., Dallas, Texas, USA.
Prashasti , Application security engineer, The New York Times, Dallas, Texas,Unites States

Abstract

Zero Trust Architecture (ZTA) is a crucial process to adopt in the evolving cybersecurity framework because of the changing IT environment where the demands of cloud computing, remote working, and working with mobile devices drive a change in architecture. Based on this, the continuous verification principle is adopted on top of the principle of "never trust, always verify," which fundamentally departs from perimeter-based security. Within Zero Trust, the idea of trusting an internal network is eliminated and treated as all systems and users from within and outside the network must be authenticated, authorized, and continually monitored. This study discusses the recent situations around Zero Trust, such as blending artificial intelligence (AI) and machine learning (ML) to improve adaptive security and predictive threat detection via behavioral analytics. Furthermore, it considers the projected technological impacts, specifically the possibility of quantum computing frustrating classical encryption methods and calling for quantum resistance. The paper also mentions the developed regulatory landscape of new regulations like GDPR and CCPA, which fit quite well with the Zero Trust principles of least privilege access and data protection. The Zero Trust model encourages every organization to mitigate cybersecurity risks by continuously innovating and adapting to new use cases in technology. It discusses practical difficulties such as legacy system integration and how you become scalable with a Zero Trust model. It stresses that the successful transition to a zero-trust model can only be done with security and compliance through a strategic, phased implementation approach.

Keywords

Zero Trust Architecture (ZTA), Security, Authentication, Compliance, Quantum Computing

References

Alexandrova, A. E. (2018). Digital government systems: tackling the legacy problem through a game-based approach to business requirements analysis. Open University (United Kingdom).

Atlam, H. F., Alenezi, A., Hussein, R. K., & Wills, G. B. (2018). Validation of an adaptive risk-based access control model for the internet of things. International Journal of Computer Network and Information Security, 15(1), 26.

Bansal, A. (2015). Energy conservation in mobile ad hoc networks using energy-efficient scheme and magnetic resonance. Journal of Networking, 3(Special Issue), 15. https://doi.org/10.11648/j.net.s.2015030301.15

Bansal, A. (2020). System to redact personal identified entities (PII) in unstructured data. International Journal of Advanced Research in Engineering and Technology, 11(6), 133. https://doi.org/10.34218/IJARET.11.6.133

Butun, I., Österberg, P., & Song, H. (2019). Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Communications Surveys & Tutorials, 22(1), 616-644.

Chavan, A. (2021). Exploring event-driven architecture in microservices: Patterns, pitfalls, and best practices. International Journal of Software and Research Analysis. https://ijsra.net/content/exploring-event-driven-architecture-microservices-patterns-pitfalls-and-best-practices

Christ, B. (2021). Maturing operational security with an automation-first approach to IAM. Cyber Security: A Peer-Reviewed Journal, 5(2), 126-134.

Da Veiga, A. (2018). An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. Information & Computer Security, 26(5), 584-612.

Dang, N. T., Tran, H. M., Nguyen, S. V., Maleszka, M., & Le, H. D. (2021). Sharing secured data on peer-to-peer applications using attribute-based encryption. Journal of Information and Telecommunication, 5(4), 440-459.

Desai, B., & Patil, A. (2020). Zero Trust with Micro-segmentation: A Software-Defined Approach to Securing Cloud-Native Applications. Annals of Applied Sciences, 1(1).

Dhru, N. (2018). Office 365 for Healthcare Professionals: Improving Patient Care through Collaboration, Compliance, and Productivity. Apress.

DiLuoffo, V., Michalson, W. R., & Sunar, B. (2018). Robot Operating System 2: The need for a holistic security approach to robotic architectures. International Journal of Advanced Robotic Systems, 15(3), 1729881418770011.

Hatakeyama, K., Kotani, D., & Okabe, Y. (2021, March). Zero trust federation: sharing context under user control towards zero trust in identity federation. In 2021 IEEE international conference on pervasive computing and communications workshops and other affiliated events (percom workshops) (pp. 514-519). IEEE.

Ike, C. C., Ige, A. B., Oladosu, S. A., Adepoju, P. A., Amoo, O. O., & Afolabi, A. I. (2021). Redefining zero trust architecture in cloud networks: A conceptual shift towards granular, dynamic access control and policy enforcement. Magna Scientia Advanced Research and Reviews, 2(1), 074-086.

Jackson, C., Gooley, J., Iliesiu, A., & Malegaonkar, A. (2020). Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide. Cisco Press.

Johnny, R. (2019). Data Protection Strategies in Zero Trust Environments.

Kerman, A., Borchert, O., Rose, S., & Tan, A. (2020). Implementing a zero trust architecture. National Institute of Standards and Technology (NIST), 75.

Knuckey, S., & Jenkin, E. (2018). Company-created remedy mechanisms for serious human rights abuses: a promising new frontier for the right to remedy?. In Corporate Power and Human Rights (pp. 149-175). Routledge.

Kumar, A. (2019). The convergence of predictive analytics in driving business intelligence and enhancing DevOps efficiency. International Journal of Computational Engineering and Management, 6(6), 118-142. Retrieved from https://ijcem.in/wp-content/uploads/THE-CONVERGENCE-OF-PREDICTIVE-ANALYTICS-IN-DRIVING-BUSINESS-INTELLIGENCE-AND-ENHANCING-DEVOPS-EFFICIENCY.pdf

Modderkolk, M. G. (2018). Zero Trust maturity matters: Modeling cyber security focus areas and maturity levels in the Zero Trust principle (Master's thesis).

Mohammed, K. H., Hassan, A., & Yusuf Mohammed, D. (2018). Identity and access management system: a web-based approach for an enterprise.

Nguyen, V. L., Lin, P. C., Cheng, B. C., Hwang, R. H., & Lin, Y. D. (2021). Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Communications Surveys & Tutorials, 23(4), 2384-2428.

Nookala, G. (2021). End-to-End Encryption in Data Lakes: Ensuring Security and Compliance. Journal of Computing and Information Technology, 1(1).

Nyati, S. (2018). Transforming telematics in fleet management: Innovations in asset tracking, efficiency, and communication. International Journal of Science and Research (IJSR), 7(10), 1804-1810. Retrieved from https://www.ijsr.net/getabstract.php?paperid=SR24203184230

Park, G. (2019). The changing wind of data privacy law: A comparative study of the European Union's General Data Protection Regulation and the 2018 California Consumer Privacy Act. UC Irvine L. Rev., 10, 1455.

Phan, K. (2018). Implementing resiliency of adaptive multi-factor authentication systems.

Pookandy, J. (2021). Multi-factor authentication and identity management in cloud CRM with best practices for strengthening access controls. International Journal of Information Technology and Management Information Systems (IJITMIS), 12(1), 85-96.

Raju, R. K. (2017). Dynamic memory inference network for natural language inference. International Journal of Science and Research (IJSR), 6(2). https://www.ijsr.net/archive/v6i2/SR24926091431.pdf

Sahay, R., Meng, W., & Jensen, C. D. (2019). The application of software defined networking on securing computer networks: A survey. Journal of Network and Computer Applications, 131, 89-108.

Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., & Kambhampati, S. (2020). A survey of moving target defenses for network security. IEEE Communications Surveys & Tutorials, 22(3), 1909-1941.

Shatz, S., & Chylik, S. E. (2019). The California consumer privacy act of 2018: A sea change in the protection of California consumers' personal information. Bus. LAw., 75, 1917.

Sicuranza, J. (2018). Usability Case Study: Reduce an Organization's Usage of Text-Based Passwords by Using Built-In Device Hardware for User Authentication (Doctoral dissertation, Pace University).

Singh, V., Doshi, V., Dave, M., Desai, A., Agrawal, S., Shah, J., & Kanani, P. (2020). Answering Questions in Natural Language About Images Using Deep Learning. In Futuristic Trends in Networks and Computing Technologies: Second International Conference, FTNCT 2019, Chandigarh, India, November 22–23, 2019, Revised Selected Papers 2 (pp. 358-370). Springer Singapore. https://link.springer.com/chapter/10.1007/978-981-15-4451-4_28

Singh, V., Oza, M., Vaghela, H., & Kanani, P. (2019, March). Auto-encoding progressive generative adversarial networks for 3D multi object scenes. In 2019 International Conference of Artificial Intelligence and Information Technology (ICAIIT) (pp. 481-485). IEEE. https://arxiv.org/pdf/1903.03477

Skopik, F., & Filip, S. (2019, June). Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1-8). IEEE.

Spyra, G. K. (2019). Embedded document security using sticky policies and identity based encryption (Doctoral dissertation).

Stafford, V. (2020). Zero trust architecture. NIST special publication, 800(207), 800-207.

Takyi, H. K. (2019). Security, Privacy, Confidentiality and Integrity of Emerging Healthcare Technologies: A Framework for Quality of Life Technologies to be HIPAA/HITECH Compliant, with Emphasis on Health Kiosk Design (Doctoral dissertation, University of Pittsburgh).

Vielberth, M., & Pernul, G. (2018). A security information and event management pattern. https://epub.uni-regensburg.de/41139/1/A%20Security%20Information%20and%20Event%20Management%20Pattern.pdf

Zwetsloot, G. I., Kines, P., Ruotsala, R., Drupsteen, L., Merivirta, M. L., & Bezemer, R. A. (2017). The importance of commitment, communication, culture and learning for the implementation of the Zero Accident Vision in 27 companies in Europe. Safety science, 96, 22-32.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Implementing Zero Trust Architecture: Modern Approaches to Secure Enterprise Networks. (2025). International Journal of Networks and Security, 5(01), 22-45. https://doi.org/10.55640/