Paper Contents
Abstract
Zero Trust Architecture (ZTA) is a modern cybersecurity approach that follows the core principle of never trust, always verify. Instead of relying on traditional perimeter-based security models, ZTA continuously validates every user, device, and request before granting access to any resource. This seminar focuses on understanding the working principles, components, and practical deployment of Zero Trust in todays enterprise environments. It explains how technologies like Identity and Access Management (IAM), Multi-Factor Authentication (MFA), micro-segmentation, and Secure Access Service Edge (SASE) contribute to building a zero-trust ecosystem.
Copyright
Copyright © 2025 Aditya Yannna, Prasanna Warang, Dushyant Kharat, Yash Raut. This is an open access article distributed under the Creative Commons Attribution License.