Singh, Harpreet Paramjeet (2025) Beyond Perimeters: Zero Trust security models in distributed cloud architectures. World Journal of Advanced Research and Reviews, 26 (2). pp. 3545-3553. ISSN 2581-9615
![WJARR-2025-1909.pdf [thumbnail of WJARR-2025-1909.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-1909.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
This article presents the implementation of Zero Trust security models in distributed cloud environments, where traditional perimeter-based security proves inadequate against sophisticated cyber threats. The core architectural components necessary for effective Zero Trust deployment include continuous authentication mechanisms, least privilege access controls, and network micro-segmentation strategies. Critical implementation challenges relate to complexity, scalability, and user experience, with mitigation frameworks based on case studies across various industries. Emerging trends in Zero Trust evolution include the integration of artificial intelligence for behavioral analytics and adaptation for edge computing environments. The findings suggest that while Zero Trust adoption introduces significant organizational and technical hurdles, its systematic implementation provides substantial security benefits for distributed cloud infrastructures. The comprehensive framework offers security practitioners and cloud architects a structured approach to Zero Trust adoption, highlighting both immediate security advantages and long-term strategic considerations.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.2.1909 |
Uncontrolled Keywords: | Zero Trust Security; Distributed Cloud Systems; Continuous Authentication; Micro-Segmentation; Identity and Access Management |
Depositing User: | Editor WJARR |
Date Deposited: | 20 Aug 2025 11:33 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/3495 |