Zero Trust Architecture: A Systematic Literature Review

  • Muhammad Liman Gambo*
  • , Ahmad Almulhem*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

The increasing complexity of digital ecosystems and evolving cybersecurity threats have highlighted the limitations of traditional perimeter-based security models, leading to the growing adoption of Zero Trust Architecture (ZTA). ZTA operates on the principle of “never trust, always verify,” enforcing continuous authentication, conditional access, dynamic trust evaluation, and the principle of least privilege to enhance security across diverse domains. This study applies the PRISMA framework to analyze 10 years of research (2016–2025) on ZTA, presenting a systematic literature review that synthesizes its applications, enabling technologies, and associated challenges. It provides a detailed taxonomy that organizes application domains of ZTA, together with the emerging technologies that facilitate its implementation, and critically examines the barriers to ZTA adoption. Additionally, the study traces the historical evolution of ZTA alongside notable events and publications trends, while highlighting some potential factors for the surge over the past few years. It also shows how ZTA principles can be strategically utilized to enforce granular access controls, continuously monitor system behavior, and streamline security management across complex, distributed networks. This comprehensive analysis serves as a practical guide for researchers and practitioners seeking to leverage ZTA for stronger, more adaptive security frameworks in a rapidly shifting threat landscape.

Original languageEnglish
Article number25
JournalJournal of Network and Systems Management
Volume34
Issue number1
DOIs
StatePublished - Mar 2026

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.

Keywords

  • Access Control
  • Authentication
  • Authorization
  • Cybersecurity
  • Perimeter-based security
  • Zero Trust
  • Zero Trust Architecture
  • ZTA

ASJC Scopus subject areas

  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications
  • Strategy and Management

Fingerprint

Dive into the research topics of 'Zero Trust Architecture: A Systematic Literature Review'. Together they form a unique fingerprint.

Cite this