Abstract
Zero Trust Architecture (ZTA) addresses a change in perspective in cyber security, challenging the conventional security-based model by expecting no certain trust inside or outside the network limits. This approach exemplifies the standards of constant confirmation, strong access controls, and the idea of "never trust, always verify" (Stafford, 2020). ZTA is intended to address the weaknesses inborn in conventional security models, particularly even with dynamic IT environments, cloud services, and the rising refinement of cyber-attacks. This paper presents a top-tobottom investigation of ZTA, its main components including severe identity verification, least privilege access, micro-segmentation, and multifaceted verification, as well as its fundamental relationship with Identity and Access Management (IAM) solutions. Moreover, this paper looks at the critical job of ZTA in lowering the attack surface, strengthening an organization's security posture, and ensuring regulatory regulations are being followed. This paper’s goal is to examine the shortcomings and weaknesses of conventional perimeter-based security models in the current digital environment and to suggest Zero Trust Architecture (ZTA) as a more potent security paradigm to deal with these issues. This research attempts to give insights into how businesses might switch from traditional security techniques to ZTA to improve their security posture.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Innovative Science and Research Technology (IJISRT)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.