Zero Trust Architecture in Cloud Security

Zero Trust Architecture in Cloud Security

Rajesh Kanna Rajendran (Christ University, India), T. Mohana Priya (Christ University, India), Sam Goundar (RMIT University, Vietnam), K. Reddy Madhavi (Mohan Babu University, India), J. Avanija (Mohan Babu University, India), and Basi Reddy Avula (Mohan Babu University, India)
Copyright: © 2025 |Pages: 16
DOI: 10.4018/979-8-3693-6859-6.ch024
OnDemand:
(Individual Chapters)
Forthcoming
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Zero Trust Architecture (ZTA) represents a paradigm shift in cloud security by challenging the outdated model of implicitly trusting internal networks. Instead of assuming trust based on network location, ZTA treats every access request—whether from inside or outside the network—as potentially malicious. This approach is crucial in cloud environments, where resources are accessed from diverse locations and devices. Implementing ZTA involves rigorous identity verification, robust multi-factor authentication (MFA), and the principle of least privilege, which restricts access to only what is necessary for users and devices. For example, deploying micro-segmentation in cloud environments can reduce the attack surface by up to 80%, effectively isolating workloads and limiting lateral movement during breaches. Advanced threat detection systems, often powered by artificial intelligence and machine learning, are employed to enhance anomaly detection and automate responses to security incidents.
Chapter Preview

Complete Chapter List

Search this Book:
Reset