ZERO TRUST: WHY TRADITIONAL SECURITY MODELS NO LONGER WORK

Authors

  • Gennady Golovko
  • Ivan Taranenko
  • Oleksiy Kushch

DOI:

https://doi.org/10.26906/SUNZ.2025.2.097

Keywords:

Zero Trust, cybersecurity, perimeter defense, network security, cloud security, access control, identity verification, digital transformation, remote work, cyber threats

Abstract

In the context of escalating cyber threats and the rapid evolution of digital work environments, traditional security models based on perimeter defense are increasingly proving inadequate. The Zero Trust model introduces a fundamental paradigm shift by eliminating the assumption of trust within corporate networks and instead adopting a continuous verification approach. This article explores the core principles and architectural components of Zero Trust, highlights its operational and strategic advantages over legacy systems, and examines the practical challenges organizations face during implementation. Particular attention is paid to how Zero Trust addresses modern cybersecurity risks such as remote work, cloud infrastructure, insider threats, and the proliferation of mobile and IoT devices. The study also analyzes real-world applications, including Google’s BeyondCorp framework, and provides practical recommendations for organizations of various sizes seeking to enhance their security posture. By offering a comparative overview and actionable guidance, this paper contributes to the development of adaptive, scalable, and resilient cybersecurity strategies for enterprises operating in a rapidly changing digital landscape.

Downloads

Download data is not yet available.

References

1. Forrester Research. The State of Zero Trust Adoption. URL: https://www.forrester.com/zero-trust/

2. CrowdStrike. Global Threat Report. URL: https://www.crowdstrike.com/en-us/resources/reports/crowdstrike-2023-globalthreat-report/

3. Kim Y., Sohn S.-G., Kim K.T., et al. (2024). Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study. KSII Transactions on Internet and Information Systems, 18(9). DOI: https://doi.org/10.3837/tiis.2024.09.011

4. Gambo M.L., Almulhem A. (2025). Zero Trust Architecture: A Systematic Literature Review. arXiv preprint. DOI:https://doi.org/10.48550/arXiv.2503.11659

5. Zanasi C., Russo S., Colajanni M. (2024). Flexible Zero Trust Architecture for the Cybersecurity of Industrial IoT Infrastructures. Ad Hoc Networks, 157. DOI: https://doi.org/10.1016/j.adhoc.2024.103414

6. NIST. Special Publication 800-207: Zero Trust Architecture. URL: https://doi.org/10.6028/NIST.SP.800-207

7. Google Cloud. BeyondCorp Enterprise Whitepaper. URL: https://cloud.google.com/beyondcorp

8. Cisco. Hybrid Work and VPN Limitations Report. URL: https://www.cisco.com/c/m/en_us/solutions/global-hybrid-workstudy.html

9. Verizon. Data Breach Investigations Report. URL: https://www.verizon.com/business/resources/reports/dbir/

10. IBM Security. Zero Trust Maturity Model: A Strategic Guide. URL: https://www.ibm.com/zero-trust

11. Gartner. Future of Work Trends: Remote Work and Cybersecurity. URL: https://www.gartner.com/en/informationtechnology/insights/remote-work-technology

12. Microsoft. Zero Trust Deployment Guidance. URL: https://learn.microsoft.com/en-us/security/zero-trust/

13. Okta. Identity-First Security in a Zero Trust World. URL: https://www.okta.com/zero-trust/

Downloads

Published

2025-06-19