Advancements in Zero Trust Security Models for Next Generation Network Infrastructures

Authors

  • Kabilan R Software Devoloper Author

Keywords:

Zero Trust Security, network architecture, micro-segmentation, identity access management, cybersecurity, continuous authentication

Abstract

Zero Trust Security (ZTS) has emerged as a critical approach to safeguarding digital assets against sophisticated threats in modern distributed networks. Unlike traditional perimeter-based models, ZTS assumes no implicit trust and continuously verifies every request. This paper explores the architecture, evolution, and real-world implementation of Zero Trust in next-generation infrastructures. It analyzes key technologies such as identity-based access, micro-segmentation, and continuous authentication. The study also compares deployment outcomes across cloud and hybrid environments, offering a roadmap for successful ZTS adoption.

References

Kindervag, J. (2010). No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Forrester Research.

Srinivas Adilapuram. (2018). Revolutionizing the Future of Credit Card Processing with Vision Plus and Mainframes. International Journal of Information Technology & Management Information System (IJITMIS), 9(3),1–11. doi: https://doi.org/10.34218/IJITMIS_09_03_001

Rose, S., et al. (2020). Zero Trust Architecture (NIST SP 800-207). National Institute of Standards and Technology.

Adilapuram, S. (2019). The Critical Role of Talent in Bridging the Mainframe Skills Gap: Key Strategies for Modernization Success. Journal of Scientific and Engineering Research, 6(10), 318–325.

Shin, S., Gu, G. (2018). Attacking Software Defined Networks: A First Feasibility Study. Proceedings of HotSDN.

Adilapuram, S. (2020). Seamlessly Connecting Mainframes to the Cloud for Scalable, Agile and Future-Ready Solutions. European Journal of Advances in Engineering and Technology, 7(3), 63–69.

Google Inc. (2014–2019). BeyondCorp Papers. Google Cloud Security Whitepapers.

Bross, J. (2017). Implementing Zero Trust Networks. Information Security Journal.

Lal, B., et al. (2016). Smart Trust: Next Generation Trust Models. MITRE Corporation.

Ayers, S. (2018). The Economics of Zero Trust. SANS Institute.

Wang, E., & Yang, L. (2019). Access Control in Cloud-Based Architectures. IEEE Access, 7, 77883–77894.

Adilapuram, S. (2020). The Roadmap to Legacy System Modernization: Phased Approach to Mainframe Migration and Cloud Adoption. Journal of Scientific and Engineering Research, 7(9), 252–257. ISSN: 2394-2630.

Liu, Y. et al. (2019). Identity-aware Security for Distributed Systems. ACM Transactions on Privacy and Security.

Sharma, R. (2019). Role of Micro-segmentation in Modern Cybersecurity. Journal of Cybersecurity Technologies, 3(1), 12–25.

Downloads

Published

2021-01-10