ZERO TRUST ARCHITECTURE IN MODERN ORGANIZATIONS

dc.contributor.authorAlisher Serikbayev
dc.date.accessioned2025-12-28T10:50:21Z
dc.date.issued2025-04-30
dc.description.abstractWith cyber threats becoming more complex and remote work becoming more common, traditional security models are becoming obsolete. This article examines the architecture of Zero Trust (ZTA), considering its key components: continuous verification, least privilege, and micro-segmentation . Based on current research up to 2025 and practical cases, the article examines the role of AI/ML and cloud solutions in strengthening ZTA. It concludes with recommendations for the phased implementation of this architecture in the enterprise environment.
dc.formatapplication/pdf
dc.identifier.urihttps://usajournals.org/index.php/2/article/view/900
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/4320
dc.language.isoeng
dc.publisherModern American Journals
dc.relationhttps://usajournals.org/index.php/2/article/view/900/972
dc.rightshttps://creativecommons.org/licenses/by/4.0
dc.sourceModern American Journal of Engineering, Technology, and Innovation; Vol. 1 No. 1 (2025); 62-69
dc.source3067-7939
dc.subjectZero Trust Architecture , cybersecurity , information security, AI/ML in security, Zero Trust Network Access (ZTNA), cloud security, digital transformation.
dc.titleZERO TRUST ARCHITECTURE IN MODERN ORGANIZATIONS
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
serikbayev_2025_zero_trust_architecture_in_modern_organi.pdf
item.page.filesection.size
368.28 KB
item.page.filesection.format
Adobe Portable Document Format