•  
  •  
 

ASEAN Journal on Science and Technology for Development

Abstract

The increasing complexity and frequency of cyber threats have necessitated the adoption of advanced security models, such as Zero Trust Architecture (ZTA). ZTA runs on the tenet that no entity whether inside or outside the network should be trusted by default, in contrast to conventional perimeter-based security solutions. This paper describes a thorough method for simulating and implementing Zero Trust Architecture in Python. We examine the essential elements and procedures of ZTA, such as identity verification, access control, and continuous monitoring, through a thorough analysis and step-by-step manual. The simulation shows how ZTA works to ensure strong network security and mitigate possible security breaches. The results demonstrate how Zero Trust concepts may be applied in real-world scenarios and offer insightful information to cybersecurity experts who want to improve their network security architectures. This research introduces a novel Python-based simulation framework for Zero Trust Architecture (ZTA), focusing on continuous monitoring, adaptive policy enforcement, and real-time decision-making. The study aims to bridge the gap in ZTA implementation by providing a customizable tool for researchers and practitioners.

Keywords

Zero Trust Architecture (ZTA), Cybersecurity, Network Security, Python Simulation, Identity Verification, Access Control, Continuous Monitoring

Publication Date

2025

Received Date

02/09/2024

Revised Date

24/12/2024

Accepted Date

24/01/2025

Share

COinS