International Journal of Cyber Threat Intelligence and Secure Networking

  1. Home
  2. Archives
  3. Vol. 2 No. 10 (2025): Volume 02 Issue 10
  4. Articles
International Journal of Cyber Threat Intelligence and Secure Networking

Article Details Page

ADAPTIVE TRUST BOUNDARY ENFORCEMENT: A COMPREHENSIVE REVIEW OF ZERO TRUST ARCHITECTURE IMPLEMENTATION AND USABILITY CHALLENGES

Authors

  • Prof. Dmitry V. Volkov Department of Computer Security, Moscow State University, Moscow, Russia
  • Dr. Kofi Agyapong School of Information and Communication Technology, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

DOI:

https://doi.org/10.55640/

Keywords:

Zero Trust, Adaptive Security, Security Fatigue, Identity-Centric Access

Abstract

Purpose: This paper systematically reviews the implementation of Zero Trust (ZT) Architecture, focusing on the critical challenges associated with its deployment and, specifically, the nuanced trade-off between enhanced security and user-perceived usability friction. It aims to synthesize the current state of practice and identify the core arguments that are shaping the next generation of adaptive access control.

 

Methodology: A systematic literature review was conducted, synthesizing academic and industry documentation on ZT principles, architectural components, and empirical studies concerning user experience. The analysis utilized a novel Security-Usability Trade-Off (SUT) Matrix to map findings related to security strength against metrics of user friction, such as security fatigue and productivity effects.

 

Findings: The findings confirm that ZT represents a fundamental paradigm shift from network-centric to identity-centric access control, leveraging real-time, continuous authentication attributes. A significant implementation barrier is the human element, where increased multi-factor authentication (MFA) requirements often lead to observable security fatigue and employee resistance. The most effective ZT models are those that integrate context-aware machine learning into the Policy Decision Point for truly adaptive, low-friction boundary enforcement.

 

Originality: This study provides a unified conceptual framework for evaluating ZT implementation success that moves beyond purely technical metrics to incorporate essential human factors. It proposes the "Frictionless ZT" model as a necessary path for maximizing compliance and minimizing organizational cost associated with security fatigue.

References

Cam-Winget N (ed.), Appala S, Pope S, Saint-Andre P (2019) Using Extensible Messaging and Presence Protocol (XMPP) for Security Information Exchange. (Internet Engineering Task Force (IETF)), IETF Request for Comments (RFC) 8600. https://doi.org/10.17487/RFC8600

Singh, V. (2025). Securing Transactional Integrity: Cybersecurity Practices in Fintech and Core Banking. QTanalytics Publication (Books), 86–96. https://doi.org/10.48001/978-81-980647-2-1-9

Software Defined Perimeter Working Group “SDP Specification 1.0” Cloud Security Alliance. April 2014.

Stanton B, Theofanos MF, Spickard Prettyman S, Furman S (2016) Security Fatigue. IT Professional 18(5):26-32. https://doi.org/10.1109/MITP.2016.84

Strouble D, Shechtman GM, Alsop AS (2009) Productivity and Usability Effects of Using a Two- Factor Security System. SAIS 2009 Proceedings (AIS, Charleston, SC), p 37. Available at http://aisel.aisnet.org/sais2009/37

Zero-Trust Architecture in Java Microservices. (2025). International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12

Weidman J, Grossklags J (2017) I Like It but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017) (ACM, Orlando, FL), pp 212-224.

https://doi.org/10.1145/3134600.3134629

Sardana, J., & Mukesh Reddy Dhanagari. (2025). Bridging IoT and Healthcare: Secure, Real-Time Data Exchange with Aerospike and Salesforce Marketing Cloud. International Journal of Computational and Experimental Science and Engineering, 11(3).

https://doi.org/10.22399/ijcesen.3853

Kumar Tiwari, S. (2023). Security testing automation for digital transformation in the age of cyber threats. International Journal of Applied Engineering & Technology, 5(S5), 135–146. Roman Science Publications.

Downloads

Published

2025-10-10

How to Cite

ADAPTIVE TRUST BOUNDARY ENFORCEMENT: A COMPREHENSIVE REVIEW OF ZERO TRUST ARCHITECTURE IMPLEMENTATION AND USABILITY CHALLENGES. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(10), 11-17. https://doi.org/10.55640/

How to Cite

ADAPTIVE TRUST BOUNDARY ENFORCEMENT: A COMPREHENSIVE REVIEW OF ZERO TRUST ARCHITECTURE IMPLEMENTATION AND USABILITY CHALLENGES. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(10), 11-17. https://doi.org/10.55640/

Similar Articles

1-10 of 18

You may also start an advanced similarity search for this article.