Abstract
With the rise and advancements of technology, digital security is facing unprecedented challenges. Traditional security measures, such as strong credentials and multi-factor authentication (MFA), are no longer sufficient to protect digital assets from attacks and unauthorized access or to effectively verify user authenticity. Zero trust architecture (ZTA) has emerged as a solution in response to these issues. Leading organizations, including Google, Forrester, Palo Alto, and CISCO, have initiated strategies to design their own deployable ZTAs to offer the perks of ZT to other organizations. It operates on various principles such as removing implicit trust, continuously authenticating users, and de-perimeterization. It provides a top-notch defense against various major cyberattacks on organizations. This study offers a comprehensive and multi-dimensional synthesis of ZTAs. It also examines the principles and implementation strategies of various ZTAs, comparing them using multiple parameters to highlight their strengths and weaknesses. In addition to the synthesis of ZTAs, the work demonstrates its practical value with sector-specific examples to make it more relevant for real-world applications. Through a detailed analysis, the study identified potential research gaps and areas in existing research that require further investigation. These insights can guide future developments in digital security. The findings aim to help organizations select and implement the most effective ZT strategies to enhance their cybersecurity posture.
Keywords
Get full access to this article
View all access options for this article.
