Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 3 (March 2026).... Submit articles

Zero trust architecture: The future of enterprise security

Breadcrumb

  • Home
  • Zero trust architecture: The future of enterprise security

Sharanya Vasudev Prasad *

University of Maryland, USA.

Review Article

World Journal of Advanced Engineering Technology and Sciences, 2025, 15(01), 660-666

Article DOI: 10.30574/wjaets.2025.15.1.0247

DOI url: https://doi.org/10.30574/wjaets.2025.15.1.0247

Received on 26 February 2025; revised on 07 April 2025; accepted on 09 April 2025

This article explores Zero Trust Architecture (ZTA) as an emerging security framework designed to meet the challenges of modern distributed computing environments. Zero Trust rejects the traditional perimeter-based security model in favor of a "never trust, always verify" approach applicable to all network entities regardless of location. The article examines how compromised credentials and lateral movement have rendered conventional security models inadequate, particularly as organizations embrace remote work and cloud services. It details the core components of Zero Trust implementation, including strong identity verification, micro-segmentation, least privilege access, and continuous monitoring. A phased deployment approach is outlined, addressing the assessment, identity management, device security, network transformation, data protection, and visibility aspects of implementation. The article acknowledges challenges organizations face during adoption, including cultural resistance, legacy system limitations, operational complexity, and user experience considerations. Beyond security enhancements, the article highlights additional benefits organizations experience with Zero Trust, including improved operational visibility, simplified compliance, streamlined access management, and enhanced business agility in supporting evolving work models.

Identity Verification; Micro-Segmentation; Least Privilege Access; Continuous Monitoring; Security Transformation

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2025-0247.pdf

Preview Article PDF

Sharanya Vasudev Prasad. Zero trust architecture: The future of enterprise security. World Journal of Advanced Engineering Technology and Sciences, 2025, 15(01), 660-666. Article DOI: https://doi.org/10.30574/wjaets.2025.15.1.0247.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution