Zero Trust Architecture: Rethinking Perimeter-Based Security Models

Authors

  • Santhosh Kumar Bandari Author

DOI:

https://doi.org/10.62647/

Keywords:

Zero Trust, Identity-Aware Proxy, Least Privilege, Micro-Segmentation, SASE, SDP, Continuous Authentication, Network Security, Zero Trust Deployment, Cybersecurity Architecture

Abstract

With the dissolution of traditional network perimeters due to cloud adoption, remote work, and mobile endpoints, Zero Trust Architecture (ZTA) has emerged as a foundational security paradigm. This paper explores the core tenets of ZTA—least privilege access, continuous verification, and micro-segmentation—and how they are implemented in real-world enterprise networks. It reviews technologies like identity-aware proxies, software-defined perimeters, and secure access service edge (SASE). Case studies illustrate how ZTA reduces lateral movement and improves breach containment, making it a strategic necessity for modern organizations.

Downloads

Download data is not yet available.

Downloads

Published

21-05-2024

How to Cite

Zero Trust Architecture: Rethinking Perimeter-Based Security Models. (2024). International Journal of Information Technology and Computer Engineering, 12(2), 899-903. https://doi.org/10.62647/

Similar Articles

1-10 of 708

You may also start an advanced similarity search for this article.