Abstract

This article explores the application of Zero Trust Architecture (ZTA) methods to enhance the cybersecurity of modern digital infrastructures. It outlines the theoretical foundations of the Zero Trust model, including core principles such as continuous verification, least-privilege enforcement, breach presumption, microsegmentation, and dynamic access policy management. Through a comprehensive literature review, the paper identifies key challenges in integrating this model into hybrid digital ecosystems and outlines future directions for research, including the convergence of ZTA with artificial intelligence technologies and the development of analytical mathematical models. The findings suggest that adopting Zero Trust practices significantly reduces the risk of lateral threat movement and increases the adaptability of access control systems—an increasingly critical factor amid ongoing digital transformation. The insights presented will be of interest to academics and cybersecurity professionals, including security strategy developers, information systems architects, and researchers focusing on the integration of Zero Trust methodologies to enhance the resilience of digital environments. Additionally, the discussion offers practical value for project leaders and policymakers engaged in digital transformation initiatives and the optimization of security processes in the face of rapidly evolving cyber threats.

Keywords

  • Blood Donation
  • Emergency Healthcare
  • Donor–Recipient Matching
  • Geo-location and Blood Bank.

References

  1. 1. Ahmadi, S. (2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports, 2 (26), 215-228.
  2. 2. Nahar, N. et al. (2024). A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks. IEEE Access, 12, 94753 – 94764.
  3. 3. Stafford, V. (2020). Zero Trust Architecture. NIST Special Publication, 207 (800), 800-207.
  4. 4. Fernandez, E. B., Brazhuk, A. (2024). A Critical Analysis of Zero Trust Architecture (ZTA). Computer Standards & Interfaces, 89,1-10.
  5. 5. Kim, A. et al. (2020). A Review of Insider Threat Detection Approaches With IoT Perspective. IEEE Access, 8, 78847-78867.
  6. 6. Xie, L. et al. (2021). A Micro-Segmentation Protection Scheme Based on Zero Trust Architecture. 6th International Conference on Information Science, Computer Technology and Transportation, 1-4.
  7. 7. Adahman, Z., Malik, A. W., Anwar, Z. (2022). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122, 1-10.
  8. 8. Kang, H. et al. (2023). Theory and Application of Zero Trust Security: A Brief Survey. Entropy, 12 (25), 1595.
  9. 9. Hosney, E. S., Halim, I. T. A., Yousef, A. H. (2022). An Artificial Intelligence Approach for Deploying Zero Trust Architecture (ZTA). 2022 5th International Conference on Computing and Informatics (ICCI), 343-350.
  10. 10. Lacity, M., Carmel, E. (2022). Self-Sovereign Identity and Verifiable Credentials in Your Digital Wallet. MIS Quarterly Executive, 3(21), 241–251.