Implementing Zero-Trust Architecture In Scalable Web And Mobile Solutions
This article examines the theoretical foundation and implementation features of Zero Trust Architecture (hereafter referred to as ZTA) for scalable web and mobile solutions. It substantiates the necessity of moving away from traditional perimeter-based security models in favor of dynamic strategies capable of providing reliable protection for distributed and hybrid systems. The practical section of the study demonstrates how modern identity management tools (Azure Active Directory, Conditional Access, MFA, passwordless authentication), microsegmentation technologies (VNet, NSG, cloud firewalls), and continuous monitoring systems (Azure Sentinel, AI-based analytics) can mitigate the risk of unauthorized access and insider attacks. The proposed ZTA implementation stages, from preliminary infrastructure auditing to continuous change management, confirm the practical effectiveness of the model and its significance for modern web and mobile solutions. The findings are highly relevant for organizations seeking to counter modern cyber threats and ensure the stable operation of information systems. The presented data is of interest to cybersecurity researchers, distributed system architects, and leading information security specialists aiming to integrate Zero Trust concepts into scalable web and mobile solutions through an in-depth analysis of both theoretical foundations and practical implementation methodologies.
1. Dakić V. et al. Analysis of Azure Zero Trust Architecture implementation for mid-size organizations //Journal of cybersecurity and privacy. – 2024. – Vol. 5 (1). – pp. 2.
2. Ahmadi S. Zero trust architecture in cloud networks: application, challenges and future opportunities //Ahmadi, S.(2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports. – 2024. – Vol. 26 (2). – pp. 215-228.
3. Steingartner W., Galinec D., Kozina A. Threat defense: Cyber deception approach and education for resilience in hybrid threats model //Symmetry. – 2021. – Vol. 13 (4). – pp. 597.
4. Lund B. D. et al. Zero Trust Cybersecurity: Procedures and Considerations in Context //Encyclopedia. – 2024. – Vol. 4 (4). – pp. 1520-1533.
5. Teerakanok S., Uehara T., Inomata A. Migrating to zero trust architecture: Reviews and challenges //Security and Communication Networks. – 2021. – Vol. 2021. (1). – pp. 1-18.
6. Mohseni Ejiyeh A. Real-Time Lightweight Cloud-Based Access Control for Wearable IoT Devices: A Zero Trust Protocol //Proceedings of the First International Workshop on Security and Privacy of Sensing Systems. – 2023. – pp. 22-29.
7. Hosney E. S., Halim I. T. A., Yousef A. H. An artificial intelligence approach for deploying zero trust architecture (zta) //2022 5th International Conference on Computing and Informatics (ICCI). – IEEE. - 2022. – pp. 343-350.
8. Che K., Sheng S. Cloud Native Network Security Architecture Strategy under Zero Trust Scenario //2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC). – IEEE. - 2023. – Vol. 7. – pp. 867-871.
9. Hong S. et al. SysFlow: Toward a programmable zero trust framework for system security //IEEE Transactions on Information Forensics and Security. – 2023. – Vol. 18. – pp. 2794-2809.
10. Bhardwaj N., Banerjee A., Roy A. Case Study of Azure and Azure Security Practices //Machine Learning Techniques and Analytics for Cloud Security. – 2021. – pp. 339-355.
Copyright (c) 2025 International Journal of Engineering and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.