ASEAN Journal on Science and Technology for Development
Abstract
The increasing complexity and frequency of cyber threats have necessitated the adoption of advanced security models, such as Zero Trust Architecture (ZTA). ZTA runs on the tenet that no entity whether inside or outside the network should be trusted by default, in contrast to conventional perimeter-based security solutions. This paper describes a thorough method for simulating and implementing Zero Trust Architecture in Python. We examine the essential elements and procedures of ZTA, such as identity verification, access control, and continuous monitoring, through a thorough analysis and step-by-step manual. The simulation shows how ZTA works to ensure strong network security and mitigate possible security breaches. The results demonstrate how Zero Trust concepts may be applied in real-world scenarios and offer insightful information to cybersecurity experts who want to improve their network security architectures. This research introduces a novel Python-based simulation framework for Zero Trust Architecture (ZTA), focusing on continuous monitoring, adaptive policy enforcement, and real-time decision-making. The study aims to bridge the gap in ZTA implementation by providing a customizable tool for researchers and practitioners.
Keywords
Zero Trust Architecture (ZTA), Cybersecurity, Network Security, Python Simulation, Identity Verification, Access Control, Continuous Monitoring
Publication Date
2025
Received Date
02/09/2024
Revised Date
24/12/2024
Accepted Date
24/01/2025
Recommended Citation
Chandre, Pankaj R.; Shendkar, Bhagyashree D.; Madachane, Sulochana Sagar; Kulkarni, Nikita; and Deshmukh, Sayalee
(2025)
"From Theory to Practice: Simulating Zero Trust Architecture with Python for Cybersecurity,"
ASEAN Journal on Science and Technology for Development: Vol. 42:
No.
1, Article 14.
DOI: https://doi.org/10.61931/2224-9028.1617
Available at:
https://ajstd.ubd.edu.bn/journal/vol42/iss1/14