Zero Trust And Micro-Segmentation: Strengthening Network Security
Ibu A Wonor , Ph.D. student, City University, Cambodia Dr Martha O Musa , University of Port Harcourt, Rivers State, Nigeria Christopher M. Osazuwa , City University, Cambodia, African CampusAbstract
Traditional perimeter-based security models, which assume trust within network boundaries, have become increasingly ineffective against evolving and sophisticated cyber threats. This study examines how Zero Trust Architecture (ZTA), based on the principle of "never trust, always verify," and micro-segmentation, which facilitates granular access control, can bolster network security. The research looks closely at the weaknesses of traditional security models, the ideas, and advantages of ZTA and micro-segmentation, the difficulties in using ZTA, the assessment of current Zero Trust frameworks, and the creation of a new combined framework. We conducted a systematic literature review to evaluate existing research, identify key themes, and pinpoint gaps in current knowledge. The findings indicate that significant challenges remain, while ZTA and micro-segmentation offer enhanced protection against insider threats and lateral movement. These include scalability issues in multi-cloud environments, difficulties integrating with legacy systems, interoperability problems, and a lack of standardised evaluation frameworks. The proposed framework aims to bridge existing gaps, fostering a more secure and adaptable approach to mitigating modern cybersecurity risks. The study concludes by emphasising the need for an integrated, scalable, and standards- compliant Zero Trust framework to overcome these limitations and strengthen network security effectively.
Keywords
Zero Trust Architecture, Zero Trust framework, micro-segmentation
References
Ahmadi , S. (2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities.Journal of Engineering Research and Reports, 26(2), 215–228. https://doi.org/10.9734/jerr/2024/v26i21083
Ahmed, S., Shihab, I., & Khokhar, A. (2025). Quantum-driven Zero Trust Framework with Dynamic Anomaly Detection in 7G Technology: A Neural Network Approach. https://doi.org/10.48550/arXiv.2502.07779
Ahn, G. Jang, J. Choi S. and Shin, D. "Researchon Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix," in IEEE Access, vol. 12, pp. 89291-89309, 2024, doi: 10.1109/ACCESS.2024.3417182.
Arora A. Hastings A. (2024). Microsegmented Cloud Network Architecture Using Open- Source Tools for a Zero Trust Foundation. International Conference on Security of Information and Networks.
Basta, N., Ikram, M., Kaafar, M. A., & Walker, A. (2021). Towards a Zero-Trust Micro- segmentation Network Security Strategy: An Evaluation Framework. Retrieved from arXiv.org.
Bishukarma, R. (2023). Scalable Zero-Trust Architectures for Enhancing Security in Multi- Cloud SaaS Platforms. International Journal of Advanced Research in Science, Communication and Technology.
Bondhala, S. (2025). Modern Defence Paradigms: Zero Trust Architecture, Network Segmentation, and Micro-Segmentation. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 11(2), 2230-2239. https://doi.org/10.32628/CSEIT25112714
Bouchrika, I. (2025, March 12). What is empirical research? Definition, types & samples for 2025. Research.com.
Christiano, P. (2023, November 4). Legacy system integration in 2025: Top 4 methods, pros & cons. ExpertBeacon.
CrowdStrike. (2025). What is threat detection and response (TDR)??
Cybersecurity Ventures. (2021). 2021 Ransomware Landscape. Available at https://cybersecurityventures.com.
Deeter, M., & Friedman, G. (2021). Network Security Models in Transition. Cybersecurity Review.
Denzel, K., & Ng'etich, S. (2025). A survey of security in zero trust network architectures. GSC Advanced Research and Reviews, 22(2), 0036. https://doi.org/10.30574/gscarr.2025.22.2.0036
Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K. U., & Hamid, Y. (2023). A Review and Comparative Analysis of Relevant Approaches of the ZeroZero Trust Network Model. Sensors, 24(4), 1328. https://doi.org/10.3390/s24041328
Estrach, P. (2023, August 18). Scalability in cloud computing: A deep dive. MEGA. Fortinet. (2025). What is an attack surface? Definition and how to reduce it.
Gambo, M. L., & Almulhem, A. (2025). Zero Trust Architecture: A Systematic Literature Review. Retrieved from arXiv.org.
Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero Trust: Applications, Challenges, and Opportunities. Retrieved from arXiv.org.
Harvard Business Review. (2020). Building organisational resilience.
Hasan, M. (2024). Enhancing Enterprise Security with Zero Trust Architecture. Retrieved from arXiv:2410.18291
HealthIT.gov. (2022, August 5, 2022. Interoperability.
Jimmy, F. N. U. (2024). Zero Trust Security: Reimagining Cyber Defence for Modern Organisations. International Journal of Scientific Research and Management (IJSRM), 10(4), 887-905. https://doi.org/10.18535/ijsrm/v10i4.ec11
Jones, T., Anderson, R., & Black, L. (2023). Erosion of the Network Perimeter: Challenges in Modern Security. Journal of Cyber Defence.
Khan, J. (2024). Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) (pp. 113-126). https://doi.org/10.4018/979-8-3693-1431-9.ch005
Kumar, R. (2024). An Extensive Analysis of Zero Trust Architecture. International Journal of Innovative Science and Research Technology, 9(5), 1056. 1 https://doi.org/10.38124/ijisrt/IJISRT24MAY1225
Li, D., Yang, Z., Yu, S., Duan, M., & Yang, S. (2024). A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology. Future Internet, 16(9), 320. https://doi.org/10.3390/fi16090320
Liu, Y., Liu, G., Du, H., Niyato, D., Kang, J., Xiong, Z., Kim, D. I., & Shen, X. (2024). Hierarchical Micro-Segmentations for Zero-Trust Services via Large Language Model (LLM)-enhanced Graph Diffusion. https://doi.org/10.48550/arXiv.2406.13964
Manzano, C., Márquez, G., & Astudillo, H. (2024). Quality Attributes for Zero Trust Architecture-Based Systems. 2024 43rd International Conference of the Chilean Computer Science Society (SCCC), 1–11. https://doi.org/10.1109/SCCC63879.2024.10767657
Mavridis, I., & Karatza, H. (2018). Combining containers and virtual machines to enhance isolation and extend functionality in cloud computing. Future Generation Computer Systems, 94, 10.1016/j.future.2018.12.035
McKinsey. (2025). Building organisational resilience.
Meng, X. (2024, March 15). Optimisation of algorithmic efficiency in AI: Addressing computational complexity and scalability challenges. Applied and Computational Engineering, 45, 305-311.
Mujib, M., & Sari, R. (2020). Performance Evaluation of Data Centre Network with Network Micro-segmentation (pp. 27-32). https://doi.org/10.1109/ICITEE49829.2020.9271749
Networks360. (2025). Enhancing network security: A comprehensive guide.
Okta. (2024). What is an attack surface? (And how to reduce it).
Parde, N. (2022, May 17). Zero-trust architecture may hold the answer to cybersecurity insider threats. MIT News | Massachusetts Institute of Technology. https://news.mit.edu/2022/zero-trust-architecture-may-hold-answer-cybersecurity- insider-threats-0517
Prydybaylo, O. (2024). Zero trust architecture, logical components, and implementation approaches. Connectivity, 169. https://doi.org/10.31673/2412-9070.2024.
ds, J., & Smith, A. (2024). Effectiveness of Continuous Verification and Micro-Segmentation in Enhancing Cybersecurity through Zero Trust Architecture.
Rocha, B., Melo, L., & de Sousa Junior, R. (2021). Preventing APT attacks on LAN networks with connected IoT devices using a zero-trust-based security model (pp. 1-6). https://doi.org/10.1109/WCNPS53648.2021.9626270
Rose, S., & Srinivasan, R. (2020). Zero Trust Architecture and Its Applications. IEEE Journal of Secure Computing.
Roy, A., Dhar, A., & Sarker Tinny, S. (2024). Strengthening IoT Cybersecurity with Zero Trust Architecture: A Comprehensive Review. Journal of Computer Science and Information Technology, 1, 25. https://doi.org/10.61424/jcsit
Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE.
Selciya, G.., Zerubbabel, I.Kannan, K. & Ezhilarasie,, R. (2024). Enhancing IIoT Security using KNN-based Hypergraph Clustering through Zero Trust Micro-Segmentation for Dynamic Network Protection (pp. 1-6). https://doi.org/10.1109/CINS63881.2024.10864440
SentinelOne. (2024). What is threat detection and response (TDR)??
SentinelOne. (2024, October 29). What is data compliance? Standards and regulations.
Sheikh, N., Pawar, M., & Lawrence, V. (2021). Zero trust using Network Micro Segmentation (pp. 1-6). https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484645
Singh, J. (2024). Zenith Armour: Advancing Security with Zero Trust Measures. International Journal of Scientific Research in Engineering and Management, 8(04), 1-5. https://doi.org/10.55041/IJSREM31326
Singh, P., & Kaur, H. (2020). A Comparative Study of Perimeter-Based Security Models. International Journal of Network Security.
Srikanth, B. (2020). Network Segmentation and Microsegmentation: Reducing Attack Surfaces in Modern Enterprise Security. International Journal of Innovative Research in Computer and Communication Engineering, 8(6), 2499-2507.
Stallings, W., & Brown, L. (2018). Network Security Essentials. Pearson Education.
Vasconcelos, A. (2025, February 25). Microsegmentation: How Microsegmentation Works: Benefits, Challenges, and Built-in Zero Trust. ero Networks. https://zeronetworks.com/blog/how-microsegmentation-works-benefits-challenges-zero-trust
Verizon. (2022). Data Breach Investigations Report. Verizon Cybersecurity Research. Zenarmor. (2025). What are the ways to improve network security?
Article Statistics
Copyright License
Copyright (c) 2025 Ibu A Wonor, Dr Martha O Musa, Christopher M. Osazuwa

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.


Management and Economics
| Open Access |
DOI: