Zero trust architecture in modern computer networks
1 Department of Computer science Engineering, Government Polytechnic Harihar, Karnataka, India.
2 Department of Computer science Engineering, Government Polytechnic Harapanahalli, Karnataka, India.
3 Department of Computer science Engineering, School of Mines KGF, Karnataka, India.
Review Article
World Journal of Advanced Research and Reviews, 2020, 07(03), 347-356
Publication history:
Received on 03 September 2020; Revised 15 September 2020; accepted on 19 September 2020
Abstract:
Zero Trust Architecture (ZTA) has emerged as a transformative security paradigm designed to address the evolving landscape of cyber threats in modern computer networks. Unlike traditional perimeter-based security models, which rely on implicit trust for internal users and devices, ZTA operates on the principle of "never trust, always verify." This approach mandates continuous authentication, strict access controls, and real-time monitoring to mitigate risks associated with insider threats, lateral movement, and external cyberattacks. This paper delves into the fundamental principles that define Zero Trust, including identity verification, least privilege access, micro-segmentation, and continuous monitoring. We explore various implementation strategies for organizations looking to adopt ZTA, highlighting best practices, policy frameworks, and the integration of advanced security technologies such as multi-factor authentication (MFA), endpoint detection and response (EDR), and artificial intelligence-driven threat detection. Despite its advantages, implementing Zero Trust comes with significant challenges, including scalability concerns, integration complexities with legacy systems, and the need for substantial organizational buy-in. We analyze these obstacles and propose mitigation strategies to facilitate smoother adoption and transition to a Zero Trust model. Through case studies and statistical analysis, this study evaluates the effectiveness of ZTA in preventing data breaches, unauthorized access, and other cyber threats. We present real-world examples from industries such as finance, healthcare, and government, where Zero Trust has been successfully deployed to enhance security resilience. Furthermore, quantitative data is used to assess key performance indicators (KPIs) such as threat detection rates, breach prevention metrics, and system performance improvements post-ZTA implementation.
Keywords:
Zero Trust Architecture (ZTA); Cybersecurity Continuous; Verification Identity ;Authentication Least; Privilege Access; Real-Time Monitoring; Security Posture
Full text article in PDF:
Copyright information:
Copyright © 2020 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0