Abstract
This research introduces Zero Trust Security models integrated into DevOps workflows. The paper outlines the implementation of security controls in GCP environments and evaluates their efficacy in mitigating risks associated with modern cloud infrastructures. The rise of cloud computing has revolutionized enterprise IT environments but has also introduced new security challenges. Zero Trust principles, which advocate "never trust, always verify," have emerged as a robust framework for securing cloud infrastructure. This paper explores the integration of Zero Trust principles within the DevOps lifecycle to enhance cloud security. It highlights how DevOps practices such as continuous integration/continuous delivery (CI/CD) and infrastructure as code (IaC) can align with Zero Trust methodologies to enforce granular access controls, continuous verification, and real-time threat detection. By embedding Zero Trust within the DevOps paradigm, organizations can establish a resilient security posture that adapts to evolving threats while maintaining operational agility.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have