UPDF AI

Zero trust network architecture for modern enterprise environments

Suganya Subramani,A. R. Kavitha,A. Rukshana Safrin

2025 · DOI: 10.1109/ICDSAAI65575.2025.11011897
0 Citations

TLDR

This review paper offers a comprehensive understanding of how Zero Trust can protect business environments from evolving cybersecurity threats and highlights areas requiring further research to enhance the resilience of network architectures.

Abstract

The Zero Trust Network Architecture (ZTNA) is a modern security approach that departs from traditional trust-based models. Emphasizing the "never trust, always verify" principle, ZTNA seeks to mitigate threats both inside and outside an organization by enforcing strict identity verification and access controls. Unlike conventional perimeter-based security, which relies on a trusted network boundary, ZTNA reduces attack surfaces and limits threat mobility. Core features of Zero Trust include strict identity verification, access control, micro-segmentation, encryption, multi-factor authentication (MFA), continuous authentication and authorization policies. This model represents an in-depth evaluation by using data preprocessing methodologies, augumentation techniques, and comparative model analysis. This survey provides a detailed overview of Zero Trust, optimization strategies, combining theoretical foundations with practical applications, offering security managing digital environments. However, this paper also addresses the challenges of ZTNA in modern business environments such as managing dynamic trust, implementing effective micro-segmentation, and balancing robust authentication with user experience. Additionally, it highlights areas requiring further research to enhance the resilience of network architectures. This review paper offers a comprehensive understanding of how Zero Trust can protect business environments from evolving cybersecurity threats.