Evaluating the Efficacy of Zero Trust Security Models for Safeguarding Sensitive Data in Cloud-Based Ecosystems

Main Article Content

Nguyen Thi Lan
Lin Mei Yu

Abstract

This paper evaluates the efficacy of Zero Trust Security Models (ZTSM) for protecting sensitive data in cloud-based ecosystems, addressing the limitations of traditional perimeter-based security. Zero Trust operates on the principle of “never trust, always verify,” enforcing strict identity verification, least-privilege access, micro-segmentation, and continuous monitoring across cloud environments. The paper explores key Zero Trust components, such as identity and access management (IAM), role-based access control, and risk-based adaptive authentication, and analyzes how these mechanisms protect cloud-based data from insider threats, unauthorized access, and regulatory non-compliance. Additionally, the paper discusses how Zero Trust addresses challenges unique to cloud ecosystems, such as the dissolution of traditional network perimeters and the risks associated with multi-tenant environments. Real-world implementations, such as Google’s BeyondCorp and Microsoft Azure’s Zero Trust model, demonstrate the scalability and effectiveness of Zero Trust in securing distributed cloud environments. While Zero Trust offers significant advantages, the paper also highlights potential challenges, including complexity, cost, and the need for cultural adaptation within organizations. Ultimately, Zero Trust provides a robust and adaptable security framework for safeguarding sensitive data, positioning it as a critical component of modern cloud security strategies.

Article Details

How to Cite
Nguyen Thi Lan, & Yu, L. M. (2023). Evaluating the Efficacy of Zero Trust Security Models for Safeguarding Sensitive Data in Cloud-Based Ecosystems. International Journal of Human-Centered Emerging Technologies, 13(9), 1–13. Retrieved from https://scicadence.com/index.php/IJHET/article/view/76
Section
Articles