ZERO TRUST ARCHITECTURE FOR LARGE-SCALE ENTERPRISE INFRASTRUCTURE SECURITY

Authors

  • Rajesh Adepu Associate Principal and IT Architecture, GuideHouse LLC, United States of America. Author

DOI:

https://doi.org/10.15662/a7fc0838

Keywords:

Zero Trust Architecture (ZTA), Enterprise Security, Identity and Access Management (IAM), Multi-Factor Authentication (MFA), Micro-Segmentation, Software-Defined Perimeter (SDP), Network Security, Cloud Security, Least Privilege Access, Continuous Authentication, Cybersecurity Framework, Threat Detection, Data Protection, Secure Access Service Edge (SASE), Risk-Based Access Control

Abstract

Zero Trust Architecture (ZTA) has emerged as a critical security paradigm for modern enterprise environments characterized by distributed systems, cloud-native applications, and an increasingly remote workforce. Traditional perimeter-based security models are no longer sufficient to defend against sophisticated cyber threats, insider risks, and lateral movement within networks. Zero Trust redefines security by enforcing the principle of "never trust, always verify," ensuring that every access request is continuously authenticated, authorized, and validated regardless of its origin.
This paper presents a comprehensive exploration of Zero Trust Architecture for large-scale enterprise infrastructure, focusing on its core principles, architectural components, and implementation strategies. It examines identity-centric security models, micro-segmentation techniques, policy enforcement mechanisms, and continuous monitoring approaches. The study further discusses integration with emerging technologies such as cloud platforms, Software-Defined Perimeters (SDP), and AI-driven threat detection systems.
Additionally, the paper highlights practical challenges in adopting Zero Trust, including legacy system integration, performance overhead, and organizational readiness. Through a generalized architectural framework and industry-aligned best practices, this research aims to provide a scalable and adaptable roadmap for enterprises transitioning to Zero Trust security models. The findings emphasize that a well-implemented ZTA significantly enhances resilience against modern cyber threats while enabling secure digital transformation.

References

[1] Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture. NIST Special Publication 800-207.

[2] Kindervag, J. (2021). Build Security Into Your Network's DNA: The Zero Trust Network Architecture. Forrester Research.

[3] Scarfone, K., & Souppaya, M. (2021). Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. NIST.

[4] Alshamrani, A., Myneni, S., Chowdhary, A., & Huang, D. (2022). A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Communications Surveys & Tutorials.

[5] Chen, L., & Zhao, J. (2022). Zero Trust Architecture: A Survey of Technologies and Challenges. IEEE Access.

[6] Zhang, R., & Liu, L. (2021). Security Models and Requirements for Healthcare Application Clouds. IEEE Cloud Computing.

[7] Behl, A., & Behl, K. (2020). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.

[8] Humayed, A., Lin, J., Li, F., & Luo, B. (2020). Cyber-Physical Systems Security — A Survey. IEEE Internet of Things Journal.

Downloads

Published

2023-11-27

How to Cite

ZERO TRUST ARCHITECTURE FOR LARGE-SCALE ENTERPRISE INFRASTRUCTURE SECURITY. (2023). International Journal of Engineering & Extended Technologies Research (IJEETR), 5(6), 171-187. https://doi.org/10.15662/a7fc0838