UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 2
February-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2402291


Registration ID:
532865

Page Number

c756-c765

Share This Article


Jetir RMS

Title

Zero Trust Architecture: Components, Principles and Implementation

Abstract

Zero Trust Architecture (ZTA) has emerged as an innovative idea in cybersecurity, challenging existing network security approaches by emphasizing tight access constraints and ongoing verification processes. This paper examines the core components, guiding concepts, and actual implementation methodologies of Zero Trust Architecture. This paper explains the fundamental elements of Zero Trust Architecture by delving into its core components, which include Policy Enforcement Points, Policy Administrators, and Policy Engines, as well as an examination of its underlying principles, such as the principle of least privilege and continuous verification. Furthermore, by exploring its implementation in a variety of sectors, including healthcare, the Internet of Things (IoT), cloud computing, and others, this article provides insights into Zero Trust Architecture's real-world applicability and usefulness. This paper aims to provide cybersecurity professionals and organizations with the knowledge and tools they need to navigate the changing landscape of network security and protect themselves from modern cyber threats by thoroughly explaining the components, principles, and implementation strategies of Zero Trust Architecture.

Key Words

Framework, Cybersecurity, Compliance, Zero Trust, Least Privilege

Cite This Article

"Zero Trust Architecture: Components, Principles and Implementation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 2, page no.c756-c765, February-2024, Available :http://www.jetir.org/papers/JETIR2402291.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Zero Trust Architecture: Components, Principles and Implementation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 2, page no. ppc756-c765, February-2024, Available at : http://www.jetir.org/papers/JETIR2402291.pdf

Publication Details

Published Paper ID: JETIR2402291
Registration ID: 532865
Published In: Volume 11 | Issue 2 | Year February-2024
DOI (Digital Object Identifier):
Page No: c756-c765
Country: Bengaluru, Karnataka, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000522

Print This Page

Current Call For Paper

Jetir RMS