A Review of Zero Trust Architecture in Protecting Critical Infrastructures

Main Article Content

Pradeep Laxkar

Abstract

The research focuses on Zero Trust Architecture deployment in business environments alongside critical infrastructure as an approach to handle changing contemporary cybersecurity threats. The study examines different organizations to find essential ZTA deployment components, which consist of continuous authentication with dynamic access control and micro-segmentation principles. The paper combines both quantitative architectural research and qualitative information about organizational adjustments and policy impact through a mixed research method design. The study reveals that Zero Trust enables productive protection of decentralization digital resources while confirming its increasing acceptance among industry organizations and governments. The study implements recognized security patterns to examine anticipated ZTA outputs, which enhances the understanding of its tactical worth and operational capabilities. The research creates links between abstract modeling and practical systems deployment through guidelines designed to ensure secure infrastructure design.

Downloads

Download data is not yet available.

Article Details

Section

Research Paper

How to Cite

A Review of Zero Trust Architecture in Protecting Critical Infrastructures. (2025). Journal of Global Research in Multidisciplinary Studies(JGRMS), 1(2), 01-06. https://doi.org/10.5281/zenodo.15245318