A Review of Authentication and Authorization Mechanisms in Zero Trust Architecture: Evolution and Efficiency
PDF

Keywords

Zero Trust Architecture (ZTA)
Authentication and Authorization
Continuous Verification
Cybersecurity Innovation
Adaptive Access Control

How to Cite

Onwuegbuzie, I. U., & Augustine Alabi , O. (2025). A Review of Authentication and Authorization Mechanisms in Zero Trust Architecture: Evolution and Efficiency. Tech-Sphere Journal for Pure and Applied Sciences, 2(1). https://doi.org/10.5281/zenodo.15149866

Abstract

Zero Trust Architecture (ZTA) is a transformative cybersecurity paradigm that mitigates the bottlenecks of the traditional perimeter-based models, operating on the principle of "never trust, always verify." It ensures stringent authentication and authorization to secure modern, complex networks against escalating threats. This paper reviews the evolution and efficiency of authentication and authorization mechanisms within ZTA, tracing their development from static, rule-based systems to dynamic, AI-driven solutions. Early methods like passwords have evolved into advanced techniques, including multi-factor authentication (MFA), passwordless systems, biometrics, and attribute-based access control (ABAC), reflecting ZTA’s adaptability to distributed environments such as IoT and cloud computing. The study evaluates these mechanisms’ efficiency through metrics like security, usability, scalability, and cost, supported by case studies and comparisons with traditional models. Findings reveal significant strengths, such as comprehensive frameworks and innovative approaches leveraging AI and blockchain, alongside limitations like insufficient empirical validation and scalability challenges. Future directions propose integrating emerging technologies quantum-resistant cryptography, decentralized identity solutions, and AI-driven verification while emphasizing industry-specific frameworks and real-world testing to enhance ZTA’s practical adoption. By addressing these gaps, this review contributes to a deeper understanding of ZTA, offering practitioners insights into best practices for securing modern networks. As cyber threats evolve, ZTA’s continuous improvement remains critical, balancing robust security with usability to safeguard sensitive data and critical infrastructure effectively.

https://doi.org/10.5281/zenodo.15149866
PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2025 Tech-Sphere Journal for Pure and Applied Sciences

Downloads

Download data is not yet available.