Zero Trust Security Models for Next Generation Enterprise Networks

Authors

  • Toru Dutt R.R.Government P.G.College, Alwar, Pune, India Author

DOI:

https://doi.org/10.15662/IJEETR.2022.0402001

Keywords:

Zero Trust Architecture (ZTA), Enterprise Network Security, Identity and Access Management (IAM), Micro-segmentation, Continuous Monitoring, Insider Threats, Legacy System Integration, Next-Generation Networks

Abstract

The traditional perimeter-based security models are increasingly inadequate in safeguarding modern enterprise networks, characterized by cloud adoption, remote work, and mobile device integration. Zero Trust Architecture (ZTA) offers a paradigm shift by enforcing the principle of "never trust, always verify," irrespective of the user's location within or outside the corporate network. This paper explores the evolution, implementation strategies, and effectiveness of ZTA in next-generation enterprise environments. Through a systematic literature review and case studies, we examine the core components of ZTA, including identity and access management, micro-segmentation, and continuous monitoring. The findings highlight the enhanced security posture ZTA provides against advanced persistent threats and insider attacks. However, challenges such as integration with legacy systems, scalability, and user experience concerns are also discussed. The paper concludes with recommendations for organizations considering ZTA adoption and outlines potential areas for future research.

References

1. Kindervag, J. (2010). No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Forrester Research.

2. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800- 207). National Institute of Standards and Technology.

3. Scott-Hayward, S., Natarajan, S., & Sezer, S. (2016). "A Survey of Security in Software Defined Networks," IEEE Communications Surveys & Tutorials, 18(1), 623-654.

4. Kovacs, E. (2019). "Understanding the impact of Zero Trust on compliance and security," Information Security Journal, 28(2), 77-84.

5. Kindervag, J. (2010). Forrester Research. "Zero Trust Model: Better Security for the Enterprise."

6. Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress.

Downloads

Published

2022-03-01

How to Cite

Zero Trust Security Models for Next Generation Enterprise Networks. (2022). International Journal of Engineering & Extended Technologies Research (IJEETR), 4(2), 4600-4603. https://doi.org/10.15662/IJEETR.2022.0402001