
explainable AI and real-time risk direction, this
research describes a future-proof ZTA solution that
can shield against changing cyber-attacks amid
today’s distributed, decentralized enterprise.
2 PROBLEM STATEMENT
Notwithstanding the increasing popularity of Zero
Trust Architecture (ZTA) as a security strategy, the
vast majority of current realizations are fragmented,
heavily dependent on static access controls, and
poorly adjusted to match hybrid infrastructures and
legacy IT solutions. Existing ZTA solutions are
increasingly incapable of converging across
numerous security layers, fail to incorporate real-time
intelligence, and do not consider dynamic user
activity or pre-contextual risk indicators. In addition,
many solutions are confined by vendor-specific
limitations and lack explainability in the case of
decision making brewed from AI, as well as lack in
scalability in heterogeneous organizations. These
gaps prevent the complete adoption of Zero Trust
and leave significant gaps in security defenses that
make it easy for both intruders and insiders to move
laterally across systems and networks and access data
they should not. Thus, there is a pressing requirement
to have an AI-enhanced ZTA framework that can be
easily integrated with legacy systems, provides
proactive and explainable security policies and is
scalable across heterogeneous IT systems.
3 LITERATURE SURVEY
The term Zero Trust Architecture (ZTA) has caught
fire as a proactive cybersecurity paradigm based on
continual Evidence of Trust, least-privilege access
and strict policy enforcement. ZTA research appears
to be largely theoretical and we didn’t find any
holistic literature daily execution frameworks Tax on
myAl-Dbiyat et al. Also, Kadali (2025) stressed the
necessity of real-time utilization of ZTA across next‐
generation workforce scenarios, but recognised the
difficult practical deployment in hybrid landscapes.
Cao et al. (2024) studied the role of automation
and orchestration in ZTA while also highlighting the
lack of AI-based policy adaptation systems. Ahmadi
(2024) described the feasibility of ZTA in cloud
environment, highlighting the issue of the non-
integration with legacy and on-premise systems.
Implementation – Chuan et al. (2020) introduced a
pragmatic model, however, it based its decisions on
old technologies and did not account for new threat
vectors and change in user behaviours.
Best practice guidance was introduced by the
Cloud Security Alliance (2021) and by the NCSC
(n.d.), however, these were more prescriptive as
opposed to adaptable, lacking empirical validation or
sector specificity. Elisity (2024) presented a vendor-
specific implementation guide, which, although
practical, has faced criticism for its solution bias and
lack of interoperability. NIST recently published
specific guidelines like in NIST (2024) with SP
1800-35 that provide a comprehensive framework,
albeit not specifically incorporating AI-augmented
access controls and behavioral risk modeling.
Dean et al. (2021) and Bellamkonda (2024) have
investigated ZTA instances in academic and
enterprise scopes, respectively, and observed
challenges when scaling and enforcing consistent
implementations. Perumal and Ahire (2025): A ZTA
model for big data cloud infrastructures was
presented but it failed to have a comprehensive
overview including human factors and cross-domain
applications. Dumitrescu and Pouwelse (2025)
presented TrustZero, a scalable ZTA architecture
which focused on openness and verifiability and that
was, however, too complex for small businesses.
Nasiruzzaman et al. (2025) presented a historic
review of the ZTA progression but did not mention
recent architectural integration issues. Aggarwal et al.
(2025) presented the possibility of uniting identity
and privilege management into one, indicating a
CIAM-PAM convergence model, vastly unproven in
high dynamic environmesnts. Atetedaye (2024)
assessed the effectiveness of ZTA in enterprise
networks, however Some corporate settings were
predominantly studied in the research, which has
implications for generalisation.
Martin (2021) sought to look at ZTA in hybrid and
big data and highlighted challenges like real-time
enforcement and backward compatibility, and
Pandiyan & Ahire (2025) on the other hand.
Supporting evidence by other studies allowing for
easy accepting may include that of Santosh et al.
(2023), Sheikh & Rajesh (2022) and Lin et al. (2024)
examined endpoint protection, policy enforcement
and AI sono-integration, however, mostly as separate
elements and not as parts of an integrated security
architecture. Olayinka & Patel (2023) emphasized the
endpoint and application-level security, whereas Kim
& Chen (2025) introduced the specific financial
sector ZTA framework, resulting in a missing issue
on the cross-industry scalability.
Taken together, the literature shows that while
foundational research in Zero Trust is developing,
ICRDICCT‘25 2025 - INTERNATIONAL CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION,
COMMUNICATION, AND COMPUTING TECHNOLOGIES
174