{"id":66550,"date":"2025-12-04T15:56:42","date_gmt":"2025-12-04T15:56:42","guid":{"rendered":"https:\/\/www.kriativ-tech.com\/?p=66550"},"modified":"2025-12-04T15:56:42","modified_gmt":"2025-12-04T15:56:42","slug":"zero-trust-architecture-overview","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66550","title":{"rendered":"Zero Trust Architecture Overview"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;200837&#8243;]Kriativ-tech Volume 1, Issue 11, Edi\u00e7\u00e3o N\u00ba 11 \u2013 4-12-2025[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;&#8221; uncode_shortcode_id=&#8221;402438&#8243;]S\u00e9rgio Pinto, Invited Assistant Professor, ISTEC Lisboa &#8211; Instituto Superior de Tecnologias Avan\u00e7adas Lisboa, Portugal[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2025%2F12%2FPaper_SPI_ZTA_v1.0.pdf|target:_blank&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;173009&#8243;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;&#8221; uncode_shortcode_id=&#8221;700474&#8243;]S\u00e9rgio Pinto <b>Zero Trust Architecture Overview<\/b>[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;&#8221; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;206939&#8243;]The Zero Trust Architecture (ZTA) represents a significant paradigm shift in network security by moving away from the traditional perimeter-based model. Instead, it follows the principle of \u201cnever trust, always verify\u201d, operating under the assumption that threats may originate both inside and outside the network. This shift requires rigorous verification of every user, device, and application requesting access to protected resources, regardless of their location. Consequently, the core elements of ZTA include strict identity verification and context control for every access request. Moreover, ZTA represents a transformative approach to addressing the limitations of traditional security frameworks. By emphasizing continuous authentication, least-privilege access, microsegmentation, and continuous monitoring, it establishes a robust foundation for protecting sensitive information in an increasingly complex threat landscape. As cyber risks evolve, adopting Zero Trust principles will be critical for organizations seeking to safeguard digital assets while ensuring that trust is never assumed but always verified.[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;&#8221; uncode_shortcode_id=&#8221;139671&#8243;]Cybersecurity, Zero Trust, \u201cVerify, Control and Enforce\u201d, Authentication, Least Privilege, Monitoring, Segmentation. [\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;&#8221; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;100659&#8243;][1] N. Howe, S. Ganguli, and G. Festa, Seven Elements of Highly Successful Zero Trust Architecture: An Architect\u2019s Guide to the Zscaler Zero Trust Exchange. Zscaler, 2024. [Online]. Available: https:\/\/info.zscaler.com\/resources-ebooks-seven-elements-of-highly-successful-zta<br \/>\n[2] E. Ok, J. Willams, and J. Nicee, \u201cUnderstanding Zero Trust Architecture,\u201d 2025. [Online]. Available: https:\/\/www.researchgate.net\/publication\/389713227_Understanding_Zero_Trust_Architecture<br \/>\n[3] O. E. Ejiofor, O. Olusoga, and A. Akinsola, \u201cZero Trust Architecture: A Paradigm Shift in Network Security,\u201d Computer Science &amp; IT Research Journal, Apr. 2025. [Online]. Available: https:\/\/www.researchgate.net\/publication\/390558157_Zero_trust_architecture_A_paradigm_shift_in_network_security<br \/>\n[4] O. Christopher, T. Tenebe, E. Etu, A. Ayuwu, J. Emakhu, and S. Adebiyi, \u201cZero Trust Architecture: Trend and Impact on Information Security,\u201d International Journal of Emerging Technology and Advanced Engineering, 2022. [Online]. Available: https:\/\/www.researchgate.net\/publication\/361758378_Zero_Trust_Architecture_Trend_and_Impact_on_Information_Security<br \/>\n[5] National Institute of Standards and Technology (NIST), Zero Trust Architecture, NIST Special Publication 800-207, 2020. [Online]. Available: https:\/\/csrc.nist.gov\/pubs\/sp\/800\/207\/final<br \/>\n[6] J. Keshav, \u201cZero-Trust Security Models Overview,\u201d 2023. [Online]. Available: https:\/\/www.researchgate.net\/publication\/377247838_Zero-Trust_Security_Models_Overview<br \/>\n[7] D. Holmes, \u201cThe Definition of Modern Zero Trust,\u201d Forrester, 2022. [Online]. Available: https:\/\/www.forrester.com\/blogs\/the-definition-of-modern-zero-trust\/<br \/>\n[8] J. Hietala, \u201cZero-Trust Architecture: Why Trusting No One Is a Smart Way to Protect Your IT Infrastructure,\u201d Red Hat, 2022. [Online]. Available: https:\/\/www.redhat.com\/architect\/zero-trust-architecture<br \/>\n[9] Zscaler site, available: https:\/\/www.zscaler.com\/resources\/security-terms-glossary\/what-is-zero-trust-architecture<\/p>\n<p>[10] Cloudflare site, available: https:\/\/www.cloudflare.com\/learning\/security\/glossary\/what-is-zero-trust\/<\/p>\n<p>[11] Crowdstrike site, available: https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/zero-trust-security\/zero-trust-architecture\/<\/p>\n<p>VI Abbreviations<\/p>\n<p>AI: Artificial Intelligence<br \/>\nDDoS: Distributed Denial of Service<br \/>\nIdP: Identity Provider<br \/>\nIAM: Identity and Access Management<br \/>\nIoT: Internet of Things<br \/>\nOT: Operational Technology<br \/>\nNIST National Institute of Standards and Technology<br \/>\nSSL\/TLS:Secure Socket Layer \/ Transport Layer Security<br \/>\nVM: Virtual Machine<br \/>\nZT: Zero Trust<br \/>\nZTA: Zero Trust Architecture[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;200837&#8243;]Kriativ-tech Volume 1, Issue 11, Edi\u00e7\u00e3o N\u00ba 11 \u2013 4-12-2025[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;&#8221; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[72],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66550"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66550"}],"version-history":[{"count":1,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66550\/revisions"}],"predecessor-version":[{"id":66552,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66550\/revisions\/66552"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}