Zero Trust Security in Web Applications: Implementing Secure Authentication and Access Control

##plugins.themes.academic_pro.article.main##

Areej Mustafa
Zillay Huma

Abstract

Zero Trust Security (ZTS) is a modern cybersecurity model that assumes no entity, whether inside or outside the network, is trusted by default. It requires continuous verification for every user and device attempting to access the network, ensuring that only authorized users can access sensitive resources. In the context of web applications, Zero Trust Security offers an advanced approach to secure authentication and access control by enforcing strict identity verification, least-privilege access, and monitoring of all activities. This model is particularly crucial in the modern threat landscape, where traditional security models, such as perimeter-based defenses, have become ineffective due to the increasing use of cloud services, mobile devices, and remote work. This paper explores the core principles of Zero Trust Security, its implementation in web applications, and how it enhances authentication and access control. It also discusses key technologies and best practices for adopting Zero Trust, ensuring that web applications remain secure in the face of evolving cyber threats.

##plugins.themes.academic_pro.article.details##

How to Cite
Mustafa, A., & Huma, Z. (2024). Zero Trust Security in Web Applications: Implementing Secure Authentication and Access Control. Pioneer Research Journal of Computing Science, 1(3), 71–79. Retrieved from http://prjcs.com/index.php/prjcs/article/view/44

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.