Zero-Trust Security Architecture for Enterprise Information Systems
DOI:
https://doi.org/10.15680/IJCTECE.2025.0806017Keywords:
Zero-Trust Security, Enterprise Information Systems, Identity and Access Management, Least Privilege, Micro-Segmentation, Continuous Authentication, Cybersecurity Architecture, Multi-Factor AuthenticationAbstract
Zero-Trust Security Architecture (ZTSA) for enterprise information systems is a modern cybersecurity paradigm that eliminates implicit trust and enforces continuous verification of users, devices, and applications regardless of location; by integrating identity-centric access control, least-privilege principles, micro-segmentation, continuous monitoring, and adaptive risk assessment, Zero-Trust enhances protection against advanced persistent threats, insider attacks, and cloud-based vulnerabilities while improving security posture, compliance, and resilience in dynamic enterprise IT environments.
References
1. Mahajan, R. A., Shaikh, N. K., Tikhe, A. B., Vyas, R., & Chavan, S. M. (2022). Hybrid Sea Lion Crow Search Algorithm-based stacked autoencoder for drug sensitivity prediction from cancer cell lines. International Journal of Swarm Intelligence Research, 13(1), 21. https://doi.org/10.4018/IJSIR.304723
2. Rathod, S. B., Ponnusamy, S., Mahajan, R. A., & Khan, R. A. H. (n.d.). Echoes of tomorrow: Navigating business realities with AI and digital twins. In Harnessing AI and digital twin technologies in businesses (Chapter 12). https://doi.org/10.4018/979-8-3693-3234-4.ch012
3. Rathod, S. B., Khandizod, A. G., & Mahajan, R. A. (n.d.). Cybersecurity beyond the screen: Tackling online harassment and cyberbullying. In AI tools and applications for women’s safety (Chapter 4). https://doi.org/10.4018/979-8-3693-1435-7.ch004
4. Devan, Karthigayan. "ENHANCING CONCOURSE CI/CD PIPELINES WITH REAL-TIME WEBHOOK TRIGGERS: A SCALABLE SOLUTION FOR GITHUB RESOURCE MANAGEMENT."
5. Devan, K. (2025). Leveraging the AWS cloud platform for CI/CD and infrastructure automation in software development. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.5049844
6. evan K, Driving Digital Transformation: LeveragingSite Reliability Engineering and Platform Engineeringfor Scalable and Resilient Systems. Appl. Sci. Eng. J.Adv. Res.. 2025;4(1):21-29.
7. Karthigayan Devan. (2025). Api Key-Driven Automation for Granular Billing Insights: An Sre and Finops Approach to Google Maps Platform Optimization. International Journal of Communication Networks and Information Security (IJCNIS), 17(1), 58–65. Retrieved from https://ijcnis.org/index.php/ijcnis/article/view/7939
8. P. Bavadiya, P. Upadhyaya, A. C. Bhosle, S. Gupta, and N. Gupta, “AI-driven Data Analytics for Cyber Threat Intelligence and Anomaly Detection,” in 2025 3rd International Conference on Advancement in Computation & Computer Technologies (InCACCT), 2025, pp. 677–681. doi: 10.1109/InCACCT65424.2025.11011329.
9. Pathik Bavadiya. (2021). A Framework for Resilient Devops Automation in Multi-Cloud KubernetesEcosystems. Journal of Informatics Education and Research, 1(3), 61–66. https://jier.org/index.php/journal/article/view/3584
10. Gupta, P. K., Nawaz, M. H., Mishra, S. S., Roy, R., Keshamma, E., Choudhary, S., ... & Sheriff, R. S. (2020). Value Addition on Trend of Tuberculosis Disease in India-The Current Update. Int J Trop Dis Health, 41(9), 41-54.
11. Hiremath, L., Kumar, N. S., Gupta, P. K., Srivastava, A. K., Choudhary, S., Suresh, R., & Keshamma, E. (2019). Synthesis, characterization of TiO2 doped nanofibres and investigation on their antimicrobial property. J Pure Appl Microbiol, 13(4), 2129-2140. Gupta, P. K., Lokur, A. V., Kallapur, S. S., Sheriff, R. S., Reddy, A. M., Chayapathy, V., ... & Keshamma, E. (2022). Machine Interaction-Based Computational Tools in Cancer Imaging. Human-Machine Interaction and IoT Applications for a Smarter World, 167-186.
12. Gopinandhan, T. N., Keshamma, E., Velmourougane, K., & Raghuramulu, Y. (2006). Coffee husk-a potential source of ochratoxin A contamination.
13. Keshamma, E., Rohini, S., Rao, K. S., Madhusudhan, B., & Udaya Kumar, M. (2008). In planta transformation strategy: an Agrobacterium tumefaciens-mediated gene transfer method to overcome recalcitrance in cotton (Gossypium hirsutum L.). J Cotton Sci, 12, 264-272.
14. Gupta, P. K., Mishra, S. S., Nawaz, M. H., Choudhary, S., Saxena, A., Roy, R., & Keshamma, E. (2020). Value Addition on Trend of Pneumonia Disease in India-The Current Update.
15. Sumanth, K., Subramanya, S., Gupta, P. K., Chayapathy, V., Keshamma, E., Ahmed, F. K., & Murugan, K. (2022). Antifungal and mycotoxin inhibitory activity of micro/nanoemulsions. In Bio-Based Nanoemulsions for Agri-Food Applications (pp. 123-135). Elsevier.
16. Hiremath, L., Sruti, O., Aishwarya, B. M., Kala, N. G., & Keshamma, E. (2021). Electrospun nanofibers: Characteristic agents and their applications. In Nanofibers-Synthesis, Properties and Applications. IntechOpen.
17. Dash, P., Javaid, S., & Hussain, M. A. (2025). Empowering Digital Business Innovation: AI, Blockchain, Marketing, and Entrepreneurship for Dynamic Growth. In Perspectives on Digital Transformation in Contemporary Business (pp. 439-464). IGI Global Scientific Publishing.
18. Hussain, M. A., Hussain, A., Rahman, M. A. U., Irfan, M., & Hussain, S. D. (2025). The effect of AI in fostering customer loyalty through efficiency and satisfaction. Advances in Consumer Research, 2, 331-340.
19. Shanthala, K., Chandrakala, B. M., & Shobha, N. (2023, November). Automated Diagnosis of brain tumor classification and segmentation of MRI Images. In 2023 International Conference on the Confluence of Advancements in Robotics, Vision and Interdisciplinary Technology Management (IC-RVITM) (pp. 1-7). IEEE.
20. Karthik, S. A., Naga, S. B. V., Satish, G., Shobha, N., Bhargav, H. K., & Chandrakala, B. M. (2025). Ai and iot-infused urban connectivity for smart cities. In Future of Digital Technology and AI in Social Sectors (pp. 367-394). IGI Global.
21. Godi, R. K., P, S. R., N, S., Bhoothpur, B. V., & Das, A. (2025). A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks. Peer-to-Peer Networking and Applications, 18(2), 97.
22. Nagar, H., & Menaria, A. K. Compositions of the Generalized Operator (????????, ????, ????, ????; ???? ????)(????) and their Application.
23. NAGAR, H., & MENARIA, A. K. (2012). Applications of Fractional Hamilton Equations within Caputo Derivatives. Journal of Computer and Mathematical Sciences Vol, 3(3), 248-421.
24. NAGAR, H., & MENARIA, A. K. (2012). Applications of Fractional Hamilton Equations within Caputo Derivatives. Journal of Computer and Mathematical Sciences Vol, 3(3), 248-421.
25. Nagar, H., & Menaria, A. K. On Generalized Function Gρ, η, γ [a, z] And It’s Fractional Calculus.
26. Rajoria, N. V., & Menaria, A. K. Numerical Approach of Fractional Integral Operators on Heat Flux and Temperature Distribution in Solid.
27. Polamarasetti, S. (2022). Using Machine Learning for Intelligent Case Routing in Salesforce Service Cloud. International Journal of AI, BigData, Computational and Management Studies, 3(1), 109-113.
28. Polamarasetti, S. (2021). Enhancing CRM Accuracy Using Large Language Models (LLMs) in Salesforce Einstein GPT. International Journal of Emerging Trends in Computer Science and Information Technology, 2(4), 81-85.
29. Polamarasetti, S. (2023). Conversational AI in Salesforce: A Study of Einstein Bots and Natural Language Understanding. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 4(3), 98-102.
30. RAMADUGU, G. (2023). CLOUD-NATIVE DIGITAL TRANSFORMATION: LESSONS FROM LARGE-SCALE DATA MIGRATIONS. International Journal of Innovation Studies, 7(1), 41-54.
31. Thota, S., Chitta, S., Vangoor, V. K. R., Ravi, C. S., & Bonam, V. S. M. (2023). Few-ShotLearning in Computer Vision: Practical Applications and Techniques. Human-Computer Interaction, 3(1).
32. Ravi, C. S., Bonam, V. S. M., & chitta, S. (2024, December). Hybrid Machine Learning Approaches for Enhanced Insurance Fraud Detection. In International Conference on Recent Trends in AI Enabled Technologies (pp. 93-104). Cham: Springer Nature Switzerland.
33. Madunuri, R., Chitta, S., Bonam, V. S. M., Vangoor, V. K. R., Yellepeddi, S. M., & Ravi, C. S. (2024, September). IoT-Driven Smart Healthcare Systems for Remote Patient Monitoring and Management. In 2024 Asian Conference on Intelligent Technologies (ACOIT) (pp. 1-7). IEEE.
34. Madunuri, R., Ravi, C. S., Chitta, S., Bonam, V. S. M., Vangoor, V. K. R., & Yellepeddi, S. M. (2024, September). Machine Learning-Based Anomaly Detection for Enhancing Cybersecurity in Financial Institutions. In 2024 Asian Conference on Intelligent Technologies (ACOIT) (pp. 1-8). IEEE.
35. Madunuri, R., Yellepeddi, S. M., Ravi, C. S., Chitta, S., Bonam, V. S. M., & Vangoor, V. K. R. (2024, September). AI-Enhanced Drug Discovery Accelerating the Identification of Potential Therapeutic Compounds. In 2024 Asian Conference on Intelligent Technologies (ACOIT) (pp. 1-8). IEEE.
36. Kumar, A. (2024). Intelligent Edge Computing Architecture for Low-Latency AI Processing in IoT Networks. Global Journal of Emerging Technologies and Multidisciplinary Research, 5(5).
37. Chitta, S., Yandrapalli, V. K., & Sharma, S. (2024, June). Optimizing SVM for Enhanced Lung Cancer Prediction: A Comparative Analysis with Traditional ML Models. In International Conference on Data Analytics & Management (pp. 143-155). Singapore: Springer Nature Singapore.
38. Whig, P., Balantrapu, S. S., Whig, A., Alam, N., Shinde, R. S., & Dutta, P. K. (2024, December). AI-driven energy optimization: integrating smart meters, controllers, and cloud analytics for efficient urban infrastructure management. In 8th IET Smart Cities Symposium (SCS 2024) (Vol. 2024, pp. 238-243). IET.
39. Polamarasetti, S., Kakarala, M. R. K., kumar Prajapati, S., Butani, J. B., & Rongali, S. K. (2025, May). Exploring Advanced API Strategies with MuleSoft for Seamless Salesforce Integration in Multi-Cloud Environments. In 2025 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) (pp. 1-9). IEEE.
40. Polamarasetti, S., Kakarala, M. R. K., Gadam, H., Butani, J. B., Rongali, S. K., & Prajapati, S. K. (2025, May). Enhancing Strategic Business Decisions with AI-Powered Forecasting Models in Salesforce CRMT. In 2025 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) (pp. 1-10). IEEE.
41. Polamarasetti, S., Kakarala, M. R. K., Goyal, M. K., Butani, J. B., Rongali, S. K., & kumar Prajapati, S. (2025, May). Designing Industry-Specific Modular Solutions Using Salesforce OmniStudio for Accelerated Digital Transformation. In 2025 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) (pp. 1-13). IEEE.
42. Ravi, C., Shaik, M., Saini, V., Chitta, S., & Bonam, V. S. M. (2025). Beyond the Firewall: Implementing Zero Trust with Network Microsegmentation. Nanotechnology Perceptions, 21, 560-578.
43. Chitta, S., Sharma, S., & Yandrapalli, V. K. (2025). Hybrid Deep Learning Model for Enhanced Breast Cancer Diagnosis Using Histopathological Images. Procedia Computer Science, 260, 245-251. https://doi.org/10.1016/j.procs.2025.03.199

