Implementing Zero Trust Architecture: Principles, Models and Challenges

Authors

  • Raghuvar Karthik Durga

DOI:

https://doi.org/10.38124/ijsrmt.v4i12.1050

Keywords:

Zero Trust Architecture, Never Trust Always Verify, Micro-Segmentation, Identity and Access Management (IAM), Least Privilege Access, NIST SP 800-207

Abstract

The combination of cloud adoption, mobile workforces, and advanced cyber threats has rendered traditional perimeter-based security models ineffective, as they no longer effectively protect networks. This paper examines Zero Trust Architecture (ZTA), a strategic security model that operates based on the fundamental concept of "never trust, always verify." The research investigates ZTA fundamentals through explicit verification and least privilege access and micro-segmentation while demonstrating how Identity and Access Management (IAM) functions as the essential foundation of this architecture. The research presents a functional deployment approach based on NIST SP 800-207 standards, which starts with protecting surface identification, followed by transaction flow mapping and implementation of detailed access controls. The research examines three major obstacles organizations encounter when implementing Zero Trust, which include user resistance to change, system integration difficulties with existing infrastructure, and challenges in maintaining user convenience. The implementation of Zero Trust represents an absolute necessity for organizations, as it creates a robust security system that protects against contemporary threats in today's distributed digital landscape.

Downloads

Download data is not yet available.

Downloads

Published

2025-12-30

How to Cite

Durga, R. K. (2025). Implementing Zero Trust Architecture: Principles, Models and Challenges. International Journal of Scientific Research and Modern Technology, 4(12), 162–170. https://doi.org/10.38124/ijsrmt.v4i12.1050

PlumX Metrics takes 2–4 working days to display the details. As the paper receives citations, PlumX Metrics will update accordingly.

Similar Articles

<< < 2 3 4 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)