IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

ZERO TRUST ARCHITECTURE IN ENTERPRISE NETWORKS

AUTHORS:
Amitesh Tripathi
Mentor
Ankur Chaudhary
Affiliation
 

Department of Information Technology, Noida Institute of Engineering and Technology, Greater Noida , India

 
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The rapid evolution of digital infrastructure has significantly increased the attack surface of modern organizations, making traditional perimeter-based security models increasingly ineffective. With the rise of cloud computing, remote work, and distributed networks, the assumption that internal networks are inherently secure no longer holds true. This paper explores the concept of Zero Trust Architecture (ZTA), a security framework that operates on the principle of “never trust, always verify.” Unlike conventional approaches, Zero Trust continuously validates users, devices, and applications before granting access to resources. The study examines the core components, working mechanisms, and practical implementation of ZTA in real-world environments. It also reviews existing literature and industry practices to highlight the strengths and limitations of this model. Furthermore, the paper identifies key challenges such as integration complexity, performance overhead, and user experience concerns, while also discussing emerging opportunities in automation, artificial intelligence, and adaptive security systems. A conceptual model of a Zero Trust-based system is proposed, focusing on layered security, identity verification, and continuous monitoring. The findings suggest that while Zero Trust is not a one-size-fits-all solution, it provides a robust foundation for addressing modern cybersecurity threats when implemented with proper planning and technological support.

Keywords
Article Metrics
Article Views
73
PDF Downloads
9
HOW TO CITE
APA

MLA

Chicago

Copy

Tripathi, A. (2026). Zero Trust Architecture in Enterprise Networks. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.193

Tripathi, Amitesh. "Zero Trust Architecture in Enterprise Networks." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.193.

Tripathi, Amitesh. "Zero Trust Architecture in Enterprise Networks." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.193.

References
1.Kindervag, “No More Chewy Centers: Introducing the Zero Trust Model of Information Security,” Forrester Research, September 2010.

2.Kindervag, “Build Security into Your Network’s DNA: The Zero Trust Network Architecture,” Forrester Research, November 2010.

3.Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” NIST Special Publication 800-207, National Institute of Standards and Technology, August 2020.

4.Gilman and D. Barth, Zero Trust Networks: Building Secure Systems in Untrusted Networks, O’Reilly Media, 2017.

5.Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2001.

6.R. Cheswick and S. M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, 1994.

7.Phiayura and S. Teerakanok, “A Comprehensive Framework for Migrating to Zero Trust Architecture,” IEEE Access, vol. 11, pp. 19487–19511, 2023.

8.L. Gambo and A. Almulhem, “Zero Trust Architecture: A Systematic Literature Review,” Journal of Network and Systems Management, vol. 34, article no. 25, 2026.

9.R. P. Reddy, “Zero Trust Architectures in Modern Enterprises: Principles, Implementation Challenges, and Best Practices,” International Journal of Computer Trends and Technology, vol. 73, no. 6, pp. 48–57, 2025.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Creased Logic: A Review of Origami’s Role in Mathematics and Beyond
string(16) "Mahima H. Jagale" Jagale, M. H.
(2026)
DOI: 10.55041/ijsmt.v2i4.150
Intelligent Healthcare Management System Powered by AI Patient and Appointment Handling
string(7) "Lakshay" Lakshay,
(2026)
DOI: 10.55041/ijsmt.v2i5.135
A Study on Patient Experience with Optimum Resource Utilization in Multi Speciality Hospital
string(11) "DHAKSHIKA V" V, D.
(2026)
DOI: 10.55041/ijsmt.v2i3.437
Scroll to Top