ISSN: 2277-8322 (Online)                                                                   

 International Journal of Recent Research and Review

HOME

ABOUT JOURNAL

ISSUES

SPECIAL ISSUES

ARTICLE SUBMISSION

EDITORIAL BOARD

INDEXING

CONTACT US

News & Events

Call For Papers

Review Process

Checkpoints Before Sending Paper


SUBJECT AREAS:

Engineering & Technology

Science

Management

Humanities

Medical Science
Nursing
Pharmaceutical Science

 

 

 

 

Volume-XVIII (Issue 3) - SEPTEMBER 2025


 

Zero Trust Architecture in Modern Cyber Security

 

 

Dhruv Trivedi

Shivam Verma

 

Keywords: Zero Trust Architecture (ZTA); Cybersecurity; Network Security; Zero Trust Model; Access Control; Micro-Segmentation; Identity and Access Management (IAM); Continuous Authentication.

 

Abstract: Zero Trust Architecture (ZTA) is widely regarded as a major change in cybersecurity frameworks. It aims to overcome the problems of perimeter-based security models that are less effective in the digital ecosystem, which is getting more and more interconnected. Due to the fast implementation of cloud computing, remote-working environment, mobile devices, and Internet of Things (IoT) technologies, conventional trust-assumed networks are not viable solutions to sophisticated cyber threats anymore. Zero Trust is based on the main idea of "never trust, always verify", thus it enforces continuous authentication, strict access controls, micro-segmentation, and real-time monitoring of all users, devices, and network resources.
This review paper traces in detail the transformation, the component parts, and the principles-of-operation of Zero Trust Architecture. It references the existing models like NIST SP 800-207 and determines the feasibility of ZTA in different organizational settings. The article also discusses the difficulties in switching to a Zero Trust model, such as the problem of integrating with legacy systems, performance overhead, and complexity of the implementation. Besides that, the paper looks at the latest breakthroughs and the future of ZTA, with new technologies and innovations like AI-driven access control, identity-centric security, and adaptive trust mechanisms to name a few. The review, in essence, demonstrates that ZTA is necessary as a contemporary cybersecurity paradigm to fight off advanced persistent threats, diminish attack surfaces, and reinforce organizational ‍‌resilience.

 

 

International Journal of Recent  Research and Review
 

  

 

ISSN: 2277-8322

Vol. XVIII, Issue 3
September 2025

 

PDF View

 

PUBLISHED
September 2025
 

ISSUE
Vol. XVIII, Issue 3

 

SECTION
Articles

 

ISSN: 2277-8322 (Online)       |               Paper Format     |    Copyright Form    |    Author Instructions


Copyright International Journal of Recent  Research and Review     -   All rights reserved.