Management and Economics | Open Access | DOI: https://doi.org/10.37547/tajmei/Volume07Issue10-05

Zero Trust And Micro-Segmentation: Strengthening Network Security

Ibu A Wonor , Ph.D. student, City University, Cambodia
Dr Martha O Musa , University of Port Harcourt, Rivers State, Nigeria
Christopher M. Osazuwa , City University, Cambodia, African Campus

Abstract

Traditional perimeter-based security models, which assume trust within network boundaries, have become increasingly ineffective against evolving and sophisticated cyber threats. This study examines how Zero Trust Architecture (ZTA), based on the principle of "never trust, always verify," and micro-segmentation, which facilitates granular access control, can bolster network security. The research looks closely at the weaknesses of traditional security models, the ideas, and advantages of ZTA and micro-segmentation, the difficulties in using ZTA, the assessment of current Zero Trust frameworks, and the creation of a new combined framework. We conducted a systematic literature review to evaluate existing research, identify key themes, and pinpoint gaps in current knowledge. The findings indicate that significant challenges remain, while ZTA and micro-segmentation offer enhanced protection against insider threats and lateral movement. These include scalability issues in multi-cloud environments, difficulties integrating with legacy systems, interoperability problems, and a lack of standardised evaluation frameworks. The proposed framework aims to bridge existing gaps, fostering a more secure and adaptable approach to mitigating modern cybersecurity risks. The study concludes by emphasising the need for an integrated, scalable, and standards- compliant Zero Trust framework to overcome these limitations and strengthen network security effectively.

Keywords

Zero Trust Architecture, Zero Trust framework, micro-segmentation

References

Ahmadi , S. (2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities.Journal of Engineering Research and Reports, 26(2), 215–228. https://doi.org/10.9734/jerr/2024/v26i21083

Ahmed, S., Shihab, I., & Khokhar, A. (2025). Quantum-driven Zero Trust Framework with Dynamic Anomaly Detection in 7G Technology: A Neural Network Approach. https://doi.org/10.48550/arXiv.2502.07779

Ahn, G. Jang, J. Choi S. and Shin, D. "Researchon Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix," in IEEE Access, vol. 12, pp. 89291-89309, 2024, doi: 10.1109/ACCESS.2024.3417182.

Arora A. Hastings A. (2024). Microsegmented Cloud Network Architecture Using Open- Source Tools for a Zero Trust Foundation. International Conference on Security of Information and Networks.

Basta, N., Ikram, M., Kaafar, M. A., & Walker, A. (2021). Towards a Zero-Trust Micro- segmentation Network Security Strategy: An Evaluation Framework. Retrieved from arXiv.org.

Bishukarma, R. (2023). Scalable Zero-Trust Architectures for Enhancing Security in Multi- Cloud SaaS Platforms. International Journal of Advanced Research in Science, Communication and Technology.

Bondhala, S. (2025). Modern Defence Paradigms: Zero Trust Architecture, Network Segmentation, and Micro-Segmentation. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 11(2), 2230-2239. https://doi.org/10.32628/CSEIT25112714

Bouchrika, I. (2025, March 12). What is empirical research? Definition, types & samples for 2025. Research.com.

Christiano, P. (2023, November 4). Legacy system integration in 2025: Top 4 methods, pros & cons. ExpertBeacon.

CrowdStrike. (2025). What is threat detection and response (TDR)??

Cybersecurity Ventures. (2021). 2021 Ransomware Landscape. Available at https://cybersecurityventures.com.

Deeter, M., & Friedman, G. (2021). Network Security Models in Transition. Cybersecurity Review.

Denzel, K., & Ng'etich, S. (2025). A survey of security in zero trust network architectures. GSC Advanced Research and Reviews, 22(2), 0036. https://doi.org/10.30574/gscarr.2025.22.2.0036

Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K. U., & Hamid, Y. (2023). A Review and Comparative Analysis of Relevant Approaches of the ZeroZero Trust Network Model. Sensors, 24(4), 1328. https://doi.org/10.3390/s24041328

Estrach, P. (2023, August 18). Scalability in cloud computing: A deep dive. MEGA. Fortinet. (2025). What is an attack surface? Definition and how to reduce it.

Gambo, M. L., & Almulhem, A. (2025). Zero Trust Architecture: A Systematic Literature Review. Retrieved from arXiv.org.

Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero Trust: Applications, Challenges, and Opportunities. Retrieved from arXiv.org.

Harvard Business Review. (2020). Building organisational resilience.

Hasan, M. (2024). Enhancing Enterprise Security with Zero Trust Architecture. Retrieved from arXiv:2410.18291

HealthIT.gov. (2022, August 5, 2022. Interoperability.

Jimmy, F. N. U. (2024). Zero Trust Security: Reimagining Cyber Defence for Modern Organisations. International Journal of Scientific Research and Management (IJSRM), 10(4), 887-905. https://doi.org/10.18535/ijsrm/v10i4.ec11

Jones, T., Anderson, R., & Black, L. (2023). Erosion of the Network Perimeter: Challenges in Modern Security. Journal of Cyber Defence.

Khan, J. (2024). Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) (pp. 113-126). https://doi.org/10.4018/979-8-3693-1431-9.ch005

Kumar, R. (2024). An Extensive Analysis of Zero Trust Architecture. International Journal of Innovative Science and Research Technology, 9(5), 1056. 1 https://doi.org/10.38124/ijisrt/IJISRT24MAY1225

Li, D., Yang, Z., Yu, S., Duan, M., & Yang, S. (2024). A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology. Future Internet, 16(9), 320. https://doi.org/10.3390/fi16090320

Liu, Y., Liu, G., Du, H., Niyato, D., Kang, J., Xiong, Z., Kim, D. I., & Shen, X. (2024). Hierarchical Micro-Segmentations for Zero-Trust Services via Large Language Model (LLM)-enhanced Graph Diffusion. https://doi.org/10.48550/arXiv.2406.13964

Manzano, C., Márquez, G., & Astudillo, H. (2024). Quality Attributes for Zero Trust Architecture-Based Systems. 2024 43rd International Conference of the Chilean Computer Science Society (SCCC), 1–11. https://doi.org/10.1109/SCCC63879.2024.10767657

Mavridis, I., & Karatza, H. (2018). Combining containers and virtual machines to enhance isolation and extend functionality in cloud computing. Future Generation Computer Systems, 94, 10.1016/j.future.2018.12.035

McKinsey. (2025). Building organisational resilience.

Meng, X. (2024, March 15). Optimisation of algorithmic efficiency in AI: Addressing computational complexity and scalability challenges. Applied and Computational Engineering, 45, 305-311.

Mujib, M., & Sari, R. (2020). Performance Evaluation of Data Centre Network with Network Micro-segmentation (pp. 27-32). https://doi.org/10.1109/ICITEE49829.2020.9271749

Networks360. (2025). Enhancing network security: A comprehensive guide.

Okta. (2024). What is an attack surface? (And how to reduce it).

Parde, N. (2022, May 17). Zero-trust architecture may hold the answer to cybersecurity insider threats. MIT News | Massachusetts Institute of Technology. https://news.mit.edu/2022/zero-trust-architecture-may-hold-answer-cybersecurity- insider-threats-0517

Prydybaylo, O. (2024). Zero trust architecture, logical components, and implementation approaches. Connectivity, 169. https://doi.org/10.31673/2412-9070.2024.

ds, J., & Smith, A. (2024). Effectiveness of Continuous Verification and Micro-Segmentation in Enhancing Cybersecurity through Zero Trust Architecture.

Rocha, B., Melo, L., & de Sousa Junior, R. (2021). Preventing APT attacks on LAN networks with connected IoT devices using a zero-trust-based security model (pp. 1-6). https://doi.org/10.1109/WCNPS53648.2021.9626270

Rose, S., & Srinivasan, R. (2020). Zero Trust Architecture and Its Applications. IEEE Journal of Secure Computing.

Roy, A., Dhar, A., & Sarker Tinny, S. (2024). Strengthening IoT Cybersecurity with Zero Trust Architecture: A Comprehensive Review. Journal of Computer Science and Information Technology, 1, 25. https://doi.org/10.61424/jcsit

Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE.

Selciya, G.., Zerubbabel, I.Kannan, K. & Ezhilarasie,, R. (2024). Enhancing IIoT Security using KNN-based Hypergraph Clustering through Zero Trust Micro-Segmentation for Dynamic Network Protection (pp. 1-6). https://doi.org/10.1109/CINS63881.2024.10864440

SentinelOne. (2024). What is threat detection and response (TDR)??

SentinelOne. (2024, October 29). What is data compliance? Standards and regulations.

Sheikh, N., Pawar, M., & Lawrence, V. (2021). Zero trust using Network Micro Segmentation (pp. 1-6). https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484645

Singh, J. (2024). Zenith Armour: Advancing Security with Zero Trust Measures. International Journal of Scientific Research in Engineering and Management, 8(04), 1-5. https://doi.org/10.55041/IJSREM31326

Singh, P., & Kaur, H. (2020). A Comparative Study of Perimeter-Based Security Models. International Journal of Network Security.

Srikanth, B. (2020). Network Segmentation and Microsegmentation: Reducing Attack Surfaces in Modern Enterprise Security. International Journal of Innovative Research in Computer and Communication Engineering, 8(6), 2499-2507.

Stallings, W., & Brown, L. (2018). Network Security Essentials. Pearson Education.

Vasconcelos, A. (2025, February 25). Microsegmentation: How Microsegmentation Works: Benefits, Challenges, and Built-in Zero Trust. ero Networks. https://zeronetworks.com/blog/how-microsegmentation-works-benefits-challenges-zero-trust

Verizon. (2022). Data Breach Investigations Report. Verizon Cybersecurity Research. Zenarmor. (2025). What are the ways to improve network security?

Article Statistics

Copyright License

Download Citations

How to Cite

Ibu A Wonor, Dr Martha O Musa, & Christopher M. Osazuwa. (2025). Zero Trust And Micro-Segmentation: Strengthening Network Security. The American Journal of Management and Economics Innovations, 7(10), 56–70. https://doi.org/10.37547/tajmei/Volume07Issue10-05