Skip to main navigation menu Skip to main content Skip to site footer

TOWARD A UNIFIED FRAMEWORK FOR ZERO TRUST ADOPTION IN INDUSTRIAL AND CLOUD ENVIRONMENTS

Abstract

The increasing frequency and sophistication of cyberattacks across both traditional IT infrastructures and emerging industrial control, cloud, and Internet-of-Things (IoT) environments demand a paradigm shift in network security. Zero Trust Architecture (ZTA) has emerged as a powerful design philosophy purporting to eliminate implicit trust and enforce continuous verification. However, existing literature often treats cloud, enterprise, and industrial IoT deployments in isolation, resulting in fragmented adoption strategies and limited cross-domain applicability. This article synthesizes key theoretical and empirical insights from foundational works and recent advances to propose a comprehensive, unified framework for Zero Trust deployment spanning enterprise IT, critical infrastructure, and industrial IoT ecosystems. Through a rigorous integrative literature review, we identify core architectural principles, domain‑specific challenges, and emergent threats such as ransomware targeting industrial control systems. We then articulate an abstract, extensible Zero Trust model that accounts for identity-centric access management, micro‑segmentation, dynamic trust evaluation, continuous monitoring, and policy orchestration. Our framework also embeds adaptive mechanisms to address latency, legacy systems, and resource constraints common in industrial and edge deployments. We conclude by elucidating limitations, paths for future empirical validation, and recommendations for stakeholders seeking a holistic security posture across heterogeneous environments.

Keywords

Industrial IoT, Critical Infrastructure, Cloud Security

PDF

References

  1. Kindervag, J. (2010). Build security into your network’s DNA: The Zero Trust network architecture. Forrester Research.
  2. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture. NIST Special Publication 800-207.
  3. Spitzner, L. (2003). Honeypots: Catching the insider threat. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), 170–179.
  4. Almorsy, M., Grundy, J., & Ibrahim, A. S. (2011). Collaboration-based cloud computing security management framework. In 2011 IEEE 4th International Conference on Cloud Computing, 364–371.
  5. Zanasi, C., Russo, S., & Colajanni, M. (2024). Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Networks, 156, 103414.
  6. Adapa, V. R. K. (2024). Zero Trust Architecture Implementation in Critical Infrastructure: a Framework for Resilient Enterprise Security. International Journal of Advanced Research in Engineering & Technology, 15(6), 76–89.
  7. Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and Application of Zero Trust Security: A Brief Survey. Entropy, 25(12), 1595.
  8. Kesarpu, S. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202–214.
  9. Kilovaty, I. (2023). Cybersecuring the Pipeline. Houston Law Review, 60.
  10. Elete, N. T. Y. (2024). Impact of ransomware on industrial control systems in the oil and gas sector: Security challenges and strategic mitigations. Computer Science & IT Research Journal, 5(12), 2664–2681.
  11. He, Y., Huang, D., Chen, L., Ni, Y., & Ma, X. (2022). A survey on Zero Trust architecture: Challenges and future trends. Wireless Communications and Mobile Computing, 1–13.
  12. Fernandez, E. B., & Brazhuk, A. (2024). A critical analysis of Zero Trust Architecture (ZTA). Computer Standards & Interfaces, 89, 103832.
  13. Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.
  14. Rapuzzi, R., & Repetto, M. (2018). Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model. Future Generation Computer Systems, 85, 235–249.

Downloads

Download data is not yet available.