Zero Trust Security Models in Cloud Environments: Compliance Implications
Abstract
The rapid adoption of cloud computing has led to an increasing need for robust security models that can protect sensitive data and ensure compliance with various regulatory frameworks. The Zero Trust security model, which operates on the principle of never trusting and always verifying, has emerged as a leading solution to address these challenges. This paper explores the role of Zero Trust in cloud security, particularly its effectiveness in meeting compliance requirements across industries such as finance, healthcare, and retail. It highlights the core components of Zero Trust, including continuous authentication, access control, and monitoring, and discusses the key technologies involved, such as identity and access management (IAM), multi-factor authentication (MFA), and encryption. The paper also examines the challenges organizations face when implementing Zero Trust, such as integrating legacy systems, data localization compliance, and operational overhead. Furthermore, the future of Zero Trust is explored, focusing on trends like AI and automation that could enhance compliance and security in cloud environments. Overall, the paper provides a comprehensive overview of how Zero Trust can strengthen cloud security while ensuring adherence to regulatory standards.
How to Cite This Article
Oluwafemi Alabi Okunlola, Jelil Olaoye, Okunlola Olalekan Samuel, Adeola Oluwaseyi Okunlola, Opeyemi Alao (2025). Zero Trust Security Models in Cloud Environments: Compliance Implications . International Journal of Future Engineering Innovations (IJFEI), 2(2), 96-102. DOI: https://doi.org/10.54660/IJFEI.2025.2.2.96-102