Adoption of Zero Trust Architecture (ZTA) in the Protection of Critical Infrastructure
Adoption of Zero Trust Architecture (ZTA) in the Protection of Critical Infrastructure
Author(s): Abraham Olasunkanmi OjoSubject(s): National Economy, Energy and Environmental Studies, Security and defense, Public Finances, ICT Information and Communications Technologies, Socio-Economic Research
Published by: Altezoro, s. r. o. & Dialog
Keywords: critical infrastructure; cyberattacks; legacy model; Zero Trust Architecture
Summary/Abstract: Securing critical infrastructure (CI), including energy, healthcare, transportation, and financial systems, is crucial due to sophisticated cyber threats. Traditional perimeter-based cybersecurity approaches are insufficient. Zero Trust Architecture (ZTA), a paradigm shift advocating "never trust, always verify," offers continuous authentication, least privilege access, and network micro-segmentation. This review examines ZTA adoption in CI protection, highlighting benefits like enhanced resilience and regulatory compliance, and challenges like legacy system integration, resource constraints, and organizational resistance. Recommendations for phased ZTA implementation and cross-sector collaboration are provided.
Journal: Traektoriâ Nauki
- Issue Year: 11/2025
- Issue No: 01
- Page Range: 5001-5008
- Page Count: 8
- Language: English
