ZERO TRUST ARCHITECTURE IN ENTERPRISE NETWORKS
Department of Information Technology, Noida Institute of Engineering and Technology, Greater Noida , India
The rapid evolution of digital infrastructure has significantly increased the attack surface of modern organizations, making traditional perimeter-based security models increasingly ineffective. With the rise of cloud computing, remote work, and distributed networks, the assumption that internal networks are inherently secure no longer holds true. This paper explores the concept of Zero Trust Architecture (ZTA), a security framework that operates on the principle of “never trust, always verify.” Unlike conventional approaches, Zero Trust continuously validates users, devices, and applications before granting access to resources. The study examines the core components, working mechanisms, and practical implementation of ZTA in real-world environments. It also reviews existing literature and industry practices to highlight the strengths and limitations of this model. Furthermore, the paper identifies key challenges such as integration complexity, performance overhead, and user experience concerns, while also discussing emerging opportunities in automation, artificial intelligence, and adaptive security systems. A conceptual model of a Zero Trust-based system is proposed, focusing on layered security, identity verification, and continuous monitoring. The findings suggest that while Zero Trust is not a one-size-fits-all solution, it provides a robust foundation for addressing modern cybersecurity threats when implemented with proper planning and technological support.
Tripathi, A. (2026). Zero Trust Architecture in Enterprise Networks. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.193
Tripathi, Amitesh. "Zero Trust Architecture in Enterprise Networks." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.193.
Tripathi, Amitesh. "Zero Trust Architecture in Enterprise Networks." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.193.
2.Kindervag, “Build Security into Your Network’s DNA: The Zero Trust Network Architecture,” Forrester Research, November 2010.
3.Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” NIST Special Publication 800-207, National Institute of Standards and Technology, August 2020.
4.Gilman and D. Barth, Zero Trust Networks: Building Secure Systems in Untrusted Networks, O’Reilly Media, 2017.
5.Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2001.
6.R. Cheswick and S. M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, 1994.
7.Phiayura and S. Teerakanok, “A Comprehensive Framework for Migrating to Zero Trust Architecture,” IEEE Access, vol. 11, pp. 19487–19511, 2023.
8.L. Gambo and A. Almulhem, “Zero Trust Architecture: A Systematic Literature Review,” Journal of Network and Systems Management, vol. 34, article no. 25, 2026.
9.R. P. Reddy, “Zero Trust Architectures in Modern Enterprises: Principles, Implementation Challenges, and Best Practices,” International Journal of Computer Trends and Technology, vol. 73, no. 6, pp. 48–57, 2025.