This academic research paper explores Zero Trust Architecture (ZTA) as a modern security model to address the limitations of traditional perimeter-based networks. The paper analyzes core Zero Trust principles such as identity-centric access control, least privilege, continuous verification, and the “assume breach” mindset. It further examines the role of Zero Trust in securing cloud environments, mitigating lateral movement, and strengthening SOC operations. The research provides a theoretical foundation that supports the architectural decisions implemented in the accompanying Zero Trust Architecture project.
adwait-gadre/Zero_Trust_Architecture_Research_Paper.pdf
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|