Zero Trust Architecture: Rethinking Perimeter-Based Security Models
DOI:
https://doi.org/10.62647/Keywords:
Zero Trust, Identity-Aware Proxy, Least Privilege, Micro-Segmentation, SASE, SDP, Continuous Authentication, Network Security, Zero Trust Deployment, Cybersecurity ArchitectureAbstract
With the dissolution of traditional network perimeters due to cloud adoption, remote work, and mobile endpoints, Zero Trust Architecture (ZTA) has emerged as a foundational security paradigm. This paper explores the core tenets of ZTA—least privilege access, continuous verification, and micro-segmentation—and how they are implemented in real-world enterprise networks. It reviews technologies like identity-aware proxies, software-defined perimeters, and secure access service edge (SASE). Case studies illustrate how ZTA reduces lateral movement and improves breach containment, making it a strategic necessity for modern organizations.
Downloads
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.











