Cloud Security: Implementing Zero Trust Architecture in Distributed Environments

Main Article Content

Samir N. Ajani, Sujata Arya, Pallavi R. Rege, Suresh Limkar

Abstract

This paper explores the implementation of Zero Trust Architecture (ZTA) in distributed cloud environments to enhance security and mitigate risks associated with data breaches. As organizations increasingly adopt cloud services, traditional perimeter-based security models become inadequate against sophisticated cyber threats. ZTA shifts the security paradigm by enforcing strict access controls, continuous authentication, and least-privilege principles, ensuring that every user and device is verified regardless of their location. The study discusses the challenges of integrating ZTA into existing cloud infrastructures, including scalability, complexity, and user experience. It also outlines best practices for deployment, emphasizing the importance of identity and access management, micro-segmentation, and real-time monitoring.

Article Details

Section
Articles