Published May 31, 2025 | Version v1
Journal article Open

Zero trust at scale: Security architecture for distributed enterprises

Authors/Creators

  • 1. University of Southern California, USA.

Description

Zero Trust Architecture (ZTA) has emerged as the essential security paradigm for modern distributed enterprises facing challenges across cloud environments, geographies, and remote workforces. This architecture fundamentally shifts security from location-based trust to identity and policy-based verification, requiring continuous authentication and authorization for every access request regardless of origin. The model encompasses three core components: identity-centric security that establishes identity as the new perimeter, microsegmentation for systematic isolation of resources, and contextual access policies that incorporate real-time risk assessments. Organizations implementing Zero Trust report substantial security improvements, including reduced breach costs and smaller attack surfaces. Despite clear benefits, implementation challenges persist, particularly around legacy system integration, performance optimization, and alignment with development practices. Technical considerations include service mesh integration, identity management at scale, and comprehensive API security controls. While the journey toward Zero Trust presents complexity, it offers a structured path for securing today's interconnected digital landscapes by decoupling identity from network location and enforcing the principle of least privilege across enterprise environments. 

Files

WJARR-2025-1939.pdf

Files (556.8 kB)

Name Size Download all
md5:5b230ca1bc888ba08a6d64d273456f7c
556.8 kB Preview Download

Additional details