RAJAMOHANAN NAIR, RAJESH (2025) Zero-trust architecture: Redefining enterprise security paradigms. World Journal of Advanced Research and Reviews, 26 (2). pp. 968-977. ISSN 2581-9615
![WJARR-2025-1684.pdf [thumbnail of WJARR-2025-1684.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-1684.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
This article examines the paradigm shift from traditional perimeter-based security to Zero-Trust Architecture (ZTA) in enterprise environments. As cyber threats continue to evolve in sophistication, conventional "castle-and-moat" security models have proven increasingly inadequate, particularly in their inability to prevent lateral movement once perimeters are breached. Zero-Trust Architecture, founded on the principle of "never trust, always verify," offers a compelling alternative by requiring continuous authentication and authorization for all network traffic regardless of its origin. The article details implementation challenges such as high initial investment costs, legacy system integration complexities, productivity impacts during transitions, organizational resistance, and technical skill gaps. It then presents evidence-based best practices for successful ZTA deployment, including starting with identity and access management, implementing multi-factor authentication, developing comprehensive asset inventories, designing network micro-segmentation, establishing continuous monitoring capabilities, creating granular security policies, and conducting regular security awareness training. It concludes by examining emerging trends in Zero-Trust evolution, including AI-driven security analytics, DevSecOps integration, IoT security extensions, behavioral biometrics, and multi-cloud implementations. It provides organizations with strategic guidance for implementing Zero-Trust principles to address the increasingly complex security challenges of modern digital business.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.2.1684 |
Uncontrolled Keywords: | Zero-Trust Architecture; Micro-Segmentation; Identity-Based Security; Continuous Verification; Least-Privilege Access |
Depositing User: | Editor WJARR |
Date Deposited: | 20 Aug 2025 10:47 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/2723 |