Zero-Trust Security Architecture for Enterprise Information Systems

Authors

  • Tarang Jain Teerthanker Mahaveer University, Moradabad, U.P., India Author

DOI:

https://doi.org/10.15680/IJCTECE.2025.0806017

Keywords:

Zero-Trust Security, Enterprise Information Systems, Identity and Access Management, Least Privilege, Micro-Segmentation, Continuous Authentication, Cybersecurity Architecture

Abstract

Zero-Trust Security Architecture (ZTSA) for enterprise information systems is a modern cybersecurity paradigm that eliminates implicit trust and enforces continuous verification of users, devices, and applications regardless of location; by integrating identity-centric access control, least-privilege principles, micro-segmentation, continuous monitoring, and adaptive risk assessment, Zero-Trust enhances protection against advanced persistent threats, insider attacks, and cloud-based vulnerabilities while improving security posture, compliance, and resilience in dynamic enterprise IT environments.

 

Downloads

Published

2025-12-15

How to Cite

Zero-Trust Security Architecture for Enterprise Information Systems. (2025). International Journal of Computer Technology and Electronics Communication, 8(6), 11722-11728. https://doi.org/10.15680/IJCTECE.2025.0806017