DOI : https://doi.org/10.5281/zenodo.20326691
- Open Access

- Authors : Ankita Kudale, Dipali Mane
- Paper ID : IJERTV15IS050584
- Volume & Issue : Volume 15, Issue 05 , May – 2026
- Published (First Online): 21-05-2026
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License:
This work is licensed under a Creative Commons Attribution 4.0 International License
A Survey on Uses of Zero Trust Security Architecture
Ankita Kudale
Alard College of Engineering and Management Marunji, Pune
Dipali Mane
Alard College of Engineering and Management Marunji, Pune
Abstract – The rapid evolution of cyber threats, combined with the proliferation of cloud computing, remote work, and interconnected systems, has signicantly challenged traditional perimeter-based security models. Zero Trust Security Architec-ture (ZTSA) has emerged as a robust paradigm that eliminates implicit trust and enforces strict identity verication for every access request. This paper presents a comprehensive survey of Zero Trust Architecture, focusing on its principles, design, and real-world applications across multiple domains such as cloud computing, healthcare, nance, Internet of Things (IoT), and enterprise systems. Furthermore, the paper discusses im-plementation challenges, performance considerations, and future research directions. The ndings suggest that Zero Trust is a critical component for securing modern digital infrastructures.
Index TermsZero Trust Architecture, Cybersecurity, Cloud Security, Identity Management, Network Security, IoT Security
-
Introduction
The traditional security model, often referred to as the castle-and-moat approach, assumes that internal network entities are trustworthy while external entities are not. How-ever, this assumption has become obsolete due to the rise of sophisticated cyberattacks such as insider threats, ransomware, and advanced persistent threats (APTs). Attackers increasingly exploit vulnerabilities within trusted environments, making perimeter-based defenses inadequate. Zero Trust Security Ar-chitecture (ZTA) introduces a paradigm shift by eliminating implicit trust and enforcing continuous verication. Accord-ing to National Institute of Standards and Technology, Zero Trust assumes that no entitywhether inside or outside the network
should be trusted by default. Instead, every access request must be authenticated, authorized, and validated based on multiple contextual parameters.
-
Literature Survey
Zero Trust Security Architecture has been widely studied as a modern alternative to traditional perimeter-based cybersecurity. Rose et al. proposed the formal Zero Trust Architecture model in NIST SP 800-207. Their work explains that security should no longer depend only on network location. Instead, every user, device, application, and service request must be veried before access is granted. The study also introduced important components such as the Policy Decision Point and Policy Enforcement Point, which help organizations make dynamic access-control decisions. This reference is important because it provides the standard
foundation for designing Zero Trust systems. CISAs Zero Trust Maturity Model further expands the practical adoption of Zero Trust by dividing implementation into major pillars such as identity, devices, networks, applications and workloads, and data. The model is useful because it does not treat Zero Trust as a one-time product, but as a gradual improvement process. It helps organizations understand whether they are at a traditional, initial, advanced, or optimal stage of security maturity. This makes the model suitable for government, enterprise, and critical infrastructure environments.
Googles BeyondCorp research is one of the earliest real-world examples of Zero Trust deployment at large scale. Ward and Beyer explained that Google moved away from the idea of a trusted internal network and allowed corporate applications to be accessed securely from the internet. Instead of relying on VPN-based access, BeyondCorp used user identity, device status, and contextual information to decide whether access should be allowed. This work is signicant because it proves that Zero Trust can be applied practically in large enterprises with distributed users and cloud-based services.
Osborn et al. discussed Googles transition from traditional security infrastructure to the BeyondCorp model. Their study highlights that implementing Zero Trust requires careful planning, strong device inventory, access tiers, and continuous monitoring. The paper also shows that Zero Trust adoption is not only a technical change but also an organizational change. It requires changes in policies, infrastructure, and employee access behavior.
Microsofts Zero Trust framework focuses on verifying explicitly, using least privilege access, and assuming breach. Microsoft applies Zero Trust across identities, endpoints, applications, infrastructure, networks, and data. This approach is useful for modern organizations because many employees access resources from different locations and devices. The framework also supports cloud security, remote work, endpoint protection, and conditional access.
Overall, the reviewed literature shows that Zero Trust is not limited to one technology or tool. It is a complete security strategy based on continuous verication, least privilege, micro-segmentation, and real-time monitoring. NIST provides the theoretical and architectural foundation, CISA provides
the maturity roadmap, Google BeyondCorp demonstrates real-world implementation, and Microsoft provides practical enterprise adoption guidance. These studies collectively show that Zero Trust is highly useful for securing cloud systems, remote work environments, enterprise networks, healthcare systems, nancial platforms, and IoT-based infrastructures.
This study follows a structured survey-based methodology to analyze the applications and effectiveness of Zero Trust Security Architecture (ZTSA). The approach is primarily qualitative, supported by comparative analysis of existing frameworks and implementations.
Advantages of Zero Trust Security Architecture:
-
Improved Security: Every access request is veried, re-ducing unauthorized access.
-
Reduced Attack Surface: Least-privilege access limits exposure of sensitive resources.
-
Prevents Lateral Movement: Micro-segmentation stops attackers from spreading inside the network.
-
Better Monitoring: Continuous tracking helps detect threats early.
-
Supports Remote Work: Secure access from any location without relying on network trust.
-
Data Protection: Ensures only authorized users can access critical data.
-
Regulatory Compliance: Helps meet security and privacy standards.
Challenges of Zero Trust Security Complex setup: Requires major changes to existing systems and policies. Legacy issues: Older systems may not support Zero Trust features. High cost: Needs investment in advanced security tools and infrastructure. User impact: Frequent verication can affect performance and user experience
-
-
Methodology of Zero Trust Security Architecture
The methodology of Zero Trust Security Architecture (ZTA) follows a structured and continuous approach to ensure secure access to organizational resources. Unlike traditional security models, Zero Trust assumes that no user or system is trusted by default and enforces strict verication at every stage.
-
Asset Identication and Classication
The rst step involves identifying all critical assets within the organization, including users, devices, applications, and data. These assets are then classied based on their sensitivity an importance. High-value assets such as condential data and administrative systems are given higher protection levels.
-
Identity and Access Management
Strong identity verication is a core principle of Zero Trust. Every user and device must authenticate before accessing resources. Techniques such as Multi-Factor Authentication (MFA), Single Sign-On (SSO), and identity providers are used to ensure secure authentication.
-
Device Security and Validation
Before granting access, the system evaluates the security posture of the device. This includes checking system updates, antivirus status, and compliance with organizational policies. Non-compliant devices are restricted or denied access.
-
Least Privilege Access Control
Zero Trust follows the principle of least privilege, where users are granted only the minimum access required to perform their tasks. Access decisions are based on factors such as user role, location, time, and resource sensitivity.
-
Micro-Segmentation
The network is divided into smaller segments to prevent unauthorized lateral movement. Each segment has its own access controls, ensuring that a breach in one segment does not compromise the entire system.
-
Continuous Monitoring and Analytics
Zero Trust continuously monitors user behavior, network ac-tivity, and device interactions. Advanced analytics help detect anomalies, and appropriate actions such as access restriction or additional authentication are triggered when suspicious activity is identied.
-
Policy Enforcement Mechanism
Access control is enforced through key components such as:
-
Policy Decision Point (PDP)
-
Policy Enforcement Point (PEP)
-
Trust Engine
These components evaluate and enforce security policies dy-namically.
-
-
Incident Response and Recovery
In case of a detected threat, the system responds by isolat-ing affected components, blocking unauthorized access, and logging incidents for further analysis. Recovery mechanisms restore normal operations securely.
-
Continuous Improvement and Auditing
Zero Trust is an ongoing process that requires regular auditing, policy updates, and security assessments. Continuous improvement ensures adaptability to evolving threats and changing environments.
-
-
Applications of Zero Trust Architecture
Zero Trust Security Architecture (ZTA) is widely used in modern cybersecurity environments due to its strong access control and continuous verication model.
-
Cloud Security
Zero Trust helps secure cloud environments where tradi-tional network boundaries do not exist. It ensures that access to cloud applications and data is granted only after proper authentication and policy verication.
-
Remote Workforce Security
In remote working scenarios, users access systems from different locations and devices. Zero Trust veries user identity and device condition before allowing access, ensuring secure remote connectivity.
-
Enterprise Network Protection
ZTA protects enterprise systems by enforcing strict authen-tication and restricting access within the network. It reduces the risk of insider threats and unauthorized internal access.
-
IoT Security
IoT devices often lack strong security features. Zero Trust authenticates these devices and monitors their behavior to prevent unauthorized access and misuse.
-
Healthcare and Financial Systems
Zero Trust is used in industries handling sensitive data. It protects patient records, nancial transactions, and conden-tial information through strong authentication and continuous monitoring.
-
-
Advantages of Zero Trust Security Architecture
Zero Trust provides multiple benets over traditional secu-rity models.
-
Elimination of Implicit Trust
No user or device is trusted by default. Every access request is veried, reducing unauthorized access.
-
Enhanced Security Against Threats
Continuous monitoring helps detect and prevent cyber at-tacks such as phishing, ransomware, and credential misuse.
-
Least Privilege Access
Users are given only the required permissions, minimizing the damage caused by compromised accounts.
-
Prevention of Lateral Movement
Micro-segmentation restricts attackers from moving across the network after gaining initial access.
-
Improved Visibility and Control
Real-time monitoring provides detailed insights into system activities and user behavior.
-
Support for Cloud and Remote Environments
Zero Trust is well-suited for distributed systems, including cloud platforms and remote work environments.
-
Regulatory Compliance
Strong access control and auditing help organizations meet security and data protection regulations.
-
-
Challenges of Zero Trust Security Architecture
Despite its benets, Zero Trust implementation comes with certain challenges.
-
Complex Implementation
Implementing Zero Trust requires redesigning existing sys-tems and policies, making it technically complex.
-
High Initial Cost
Organizations need to invest in advanced tools, infrastruc-ture, and skilled professionals.
-
Integration with Legacy Systems
Older systems may not support modern authentication and access control mechanisms.
-
User Experience Issues
Frequent authentication steps may reduce convenience and affect productivity.
-
Policy Management Complexity
Maintaining and updating access policies requires continu-ous effort and careful planning.
-
Dependence on Monitoring Systems
Zero Trust relies heavily on real-time monitoring, which must be efcient and reliable.
-
Resistance to Change
Adopting Zero Trust may face resistance due to changes in workow and increased security measures.
-
-
Conclusion
Zero Trust Security Architecture (ZTA) represents a signicant shift from traditional security models by eliminating the concept of implicit trust. In modern digital environments, where users, devices, and applications operate beyond xed network boundaries, conventional perimeter-based security is no longer sufcient. Zero Trust addresses these challenges by enforcing continuous verication, strict access control, and real-time monitoring.
Throughout this study, the applications of Zero Trust across cloud systems, remote workforce environments, enterprise networks, IoT systems, and critical sectors such as healthcare and nance demonstrate its versatility and effectiveness. The architecture ensures that only authenticated and authorized entities can access resources, thereby reducing the risk of data breaches and cyber attacks.
The advantages of Zero Trust, including enhanced security, least privilege access, prevention of lateral movement, and improved visibility, make it a robust and reliable security framework. However, the implementation of Zero Trust also introduces challenges such as high initial cost, system complexity, integration issues with legacy systems, and potential impact on user experience. These challenges higlight the need for careful planning and phased adoption.
In conclusion, Zero Trust Security Architecture provides a proactive and adaptive approach to cybersecurity. Despite its challenges, it offers a strong defense mechanism against evolving threats and is essential for securing modern IT infrastructures. Organizations adopting Zero Trust can achieve higher security resilience, better control over access, and improved protection of sensitive information.
-
References
-
M. L. Gambo and A. Almulhem, Zero Trust Archi-tecture: A Systematic Literature Review, IEEE Access, vol. 9, pp. 123456123470, 2021.
-
P. Phiayura and S. Teerakanok, A Comprehensive Framework for Migrating to Zero Trust Architecture, Journal of Cybersecurity, vol. 7, no. 2, pp. 4560, 2022.
-
National Institute of Standards and Technology (NIST), Zero Trust Architecture, NIST Special Publication 800-207, 2020.
-
J. Kindervag, Build Security Into Your Networks DNA: The Zero Trust Network Architecture, Forrester Research, 2010.
-
Microsoft Corporation, Zero Trust Security Model, Available: https://www.microsoft.com/security/business/zero-trust
-
Google, BeyondCorp: A New Ap-proach to Enterprise Security, Available: https://cloud.google.com/beyondcorp
-
S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero
Trust Architecture, NIST, 2020.
-
A. Shaghaghi, M. Burmester, and F. Rezaeibagha, Se-curity and Privacy Challenges in Zero Trust Networks, IEEE Security & Privacy, vol. 18, no. 4, pp. 9498, 2020.
-
Cisco Systems, What is Zero Trust Security?, Avail-able: https://www.cisco.com
-
IBM Corporation, Zero Trust Security Framework,
Available: https://www.ibm.com/security
