Downloads

Keywords:

Blood Donation, Emergency Healthcare, Donor–Recipient Matching, Geo-location and Blood Bank.

Applying Zero Trust Architecture Principles in Digital Infrastructures

Authors

Sergei Beliachkov 1
Head of Department, Platform Cybersecurity Center, JSC Sberbank-Technologies Moscow, Russia 1

Abstract

This article explores the application of Zero Trust Architecture (ZTA) methods to enhance the cybersecurity of modern digital infrastructures. It outlines the theoretical foundations of the Zero Trust model, including core principles such as continuous verification, least-privilege enforcement, breach presumption, microsegmentation, and dynamic access policy management. Through a comprehensive literature review, the paper identifies key challenges in integrating this model into hybrid digital ecosystems and outlines future directions for research, including the convergence of ZTA with artificial intelligence technologies and the development of analytical mathematical models. The findings suggest that adopting Zero Trust practices significantly reduces the risk of lateral threat movement and increases the adaptability of access control systems—an increasingly critical factor amid ongoing digital transformation. The insights presented will be of interest to academics and cybersecurity professionals, including security strategy developers, information systems architects, and researchers focusing on the integration of Zero Trust methodologies to enhance the resilience of digital environments. Additionally, the discussion offers practical value for project leaders and policymakers engaged in digital transformation initiatives and the optimization of security processes in the face of rapidly evolving cyber threats.

Article Details

Published

2025-10-25

Section

Articles

License

Copyright (c) 2025 International Journal of Engineering and Computer Science Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

How to Cite

Applying Zero Trust Architecture Principles in Digital Infrastructures. (2025). International Journal of Engineering and Computer Science, 14(10), 27781-27787. https://doi.org/10.18535/ijecs.v14i10.5294