A Review of Zero Trust Architecture in Protecting Critical Infrastructures
Main Article Content
Abstract
The research focuses on Zero Trust Architecture deployment in business environments alongside critical infrastructure as an approach to handle changing contemporary cybersecurity threats. The study examines different organizations to find essential ZTA deployment components, which consist of continuous authentication with dynamic access control and micro-segmentation principles. The paper combines both quantitative architectural research and qualitative information about organizational adjustments and policy impact through a mixed research method design. The study reveals that Zero Trust enables productive protection of decentralization digital resources while confirming its increasing acceptance among industry organizations and governments. The study implements recognized security patterns to examine anticipated ZTA outputs, which enhances the understanding of its tactical worth and operational capabilities. The research creates links between abstract modeling and practical systems deployment through guidelines designed to ensure secure infrastructure design.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.