Zero trust framework for protecting federal networks and cloud services

Authors

  • Sudheer Kotilingala IBM Corporation

DOI:

https://doi.org/10.58524/app.sci.def.v3i1.669

Keywords:

Cloud computing, FedRAMP, Network Security, Zero Trust Architecture

Abstract

There has been a rapid uptake of cloud technologies in public sectors due to increased efficiency across operations while increasing the complexity of cyber threats. This paper analyses the original Zero Trust Architecture (ZTA) concept as a security concept applicable to federal networks and cloud services protection. It mainly involves linking ZTA principles with FedRAMP regulations and insists on constant validation, minimisation of rights, and breach presumption. The study outlines guidelines for ZTA implementations for compliance and readiness in the cloud environments.

References

CISA. (2021). Cybersecurity and Infrastructure Security Agency - Zero Trust Maturity Model. Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security division.

Stafford, V. (2020). Zero trust architecture. NIST special publication, 800, p.207.

Kopparthi, V. J. R. (2024). Federal cloud security: A strategic approacj to FedRAMP compliance and governance. International Journal of Research in Computer Applications and Information Technology (IJRCAIT), 7(2), 2288–2296. https://doi.org/10.5281/zenodo.14500455

Sarkar, S., Choudhary, G., Shandilya, S. K., Hussain, A., & Kim, H. (2022). Security of Zero Trust Networks in Cloud Computing: A Comparative Review. Sustainability, 14(18), 11213. https://doi.org/10.3390/su141811213

NSA. (2021). Zero trust: A guide for implementation. National Security Agency, U.S.

Taylor, L. (2014). FedRAMP: History and future direction. IEEE Cloud Computing, 1(3), 10-14. https://doi.org/10.1109/MCC.2014.54

Kolawole, I. (2025). Leveraging Cloud-based ai and zero trust architecture to enhance U. S. cybersecurity and counteract foreign threats. World Journal of Advanced Research and Reviews, 2025, 25(03), 006-025. https://doi.org/10.30574/wjarr.2025.25.3.0635

Veeramachaneni, V. (2024). Integrating Zero Trust Principles into IAM for Enhanced Cloud Security. Recent Trends in Cloud Computing and Web Engineering, 7(1), 78–92. https://doi.org/10.5281/zenodo.14162091

Ahmadi, S. (2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports, 26(2), 215–228. https://doi.org/10.9734/jerr/2024/v26i21083

Chandramouli, R., & Butcher, Z. (2023). A zero-trust architecture model for access control in cloud-native applications in multi-location environments. US Department of Commerce, National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207A

Paul, B., & Rao, M. (2023). Zero-trust model for smart manufacturing industry. Applied Sciences, 13(1), 221. https://doi.org/10.3390/app13010221

Shepherd, C. (2022). Zero trust architecture: Framework and case study (Graduate Student Project). Boise State University.

Akinsanya, A. (2024). Securing the Future: Implementing a Zero-Trust Framework in U.S. Critical Infrastructure Cybersecurity. International Journal of Advance Research, Ideas and Innovations in Technology, 10(3) V1013-1221.www.IJARIIT.com

Phiayura, P., & Teerakanok, S. (2023). A comprehensive framework for migrating to zero trust architecture. IEEE Access, 11, 19487-19511. https://doi.org/10.1109/ACCESS.2023.3248622

Azad, M. A., Abdullah, S., Arshad, J., Lallie, H., & Ahmed, Y. H. (2024). Verify and trust: A multidimensional survey of zero-trust security in the age of IoT. Internet of Things, 27, 101227. https://doi.org/10.1016/j.iot.2024.101227

Kim, H., Kim, Y., & Kim, S. (2024). A study on the security requirements analysis to build a zero trust-based remote work environment. Retreived from arXiv preprint arXiv:2401.03675.

Ajish, D. The significance of artificial intelligence in zero trust technologies: a comprehensive review. Journal of Electrical Systems and Information Technology, 11(30), 1-23. https://doi.org/10.1186/s43067-024-00155-z

Syrotynskyi, R., Tyshyk, I., Kochan, O., Sokolov, V., & Skladannyi, P. (2024). Methodology of network infrastructure analysis as part of migration to zero-trust architecture. CSDP 2024, (3800), 97-105.

Tanque, M., & Foxwell, H. J. (2023). Cyber risks on IoT platforms and zero trust solutions. In Advances in Computers, 131(2023), 79-148. https://doi.org/10.1016/bs.adcom.2023.04.003

Kim, Y., Sohn, S. G., Jeon, H. S., Lee, S. M., Lee, Y., & Kim, J. (2024). Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study. KSII Transactions on Internet and Information Systems (TIIS), 18(9), 2665-2691.

Sweeney, C. (2021). A Zero-Knowledge Multi-Factor Authentication Framework for Actualizing the Federal Zero-Trust Enterprise (Master's thesis), Utica College.

Bobbert, Y., & Timmermans, T. (2024). Zero Trust and Compliance with Industry Frameworks and Regulations. In: Arai, K. (eds) Advances in Information and Communication. FICC 2024. Lecture Notes in Networks and Systems, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-031-54053-0_43

Colomb, Y., White, P., Islam, R., & Alsadoon, A. (2023). Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud. In: Daimi, K., Alsadoon, A., Peoples, C., El Madhoun, N. (eds) Emerging Trends in Cybersecurity Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-09640-2_7

Vang, T., & Lind, M. L. (2023). Factors Influencing Cloud Computing Adoption in a Zero-Trust Environment. https://doi.org/10.21203/rs.3.rs-3152878/v1

Ren, Y., Wang, Z., Sharma, P. K., Alqahtani, F., Tolba, A., & Wang, J. (2025). Zero Trust Networks: Evolution and Application from Concept to Practice. Computers, Materials & Continua, 82(2), 1593-1613. https://doi.org/10.32604/cmc.2025.059170

Downloads

Published

2025-04-25

How to Cite

Kotilingala, S. (2025). Zero trust framework for protecting federal networks and cloud services. International Journal of Applied Mathematics, Sciences, and Technology for National Defense, 3(1), 35-44. https://doi.org/10.58524/app.sci.def.v3i1.669