Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Peer Reviewed and Referred Journal || Free Certificate of Publication

Research and review articles are invited for publication in March 2026 (Volume 18, Issue 3) Submit manuscript

Zero trust security model implementation in Kubernetes-based cloud infrastructure

Breadcrumb

  • Home
  • Zero trust security model implementation in Kubernetes-based cloud infrastructure

Nishanth Reddy Pinnapareddy *

Senior Software Enginner, California, USA.

Review Article
 
International Journal of Science and Research Archive, 2021, 01(02), 109-135.
Article DOI: 10.30574/ijsra.2021.1.2.0007
DOI url: https://doi.org/10.30574/ijsra.2021.1.2.0007

Received on 19 December 2020; revised on 27 January 2021; accepted on 29 January 2021

With more and more organizations adopting cloud-native technologies, securing dynamic, distributed and otherwise dynamic environments like Kubernetes is becoming more of a challenge. Modern cyber threats require modern security models, which are made from scratch and cannot rely on perimeter defense models. As an effective solution for securing Kubernetes-based infrastructures, the Zero Trust Security Model (ZTSM), or no entity is trusted by default, is on the rise. A zero-trust principle in a multi-cluster Kubernetes environment is explored regarding identity and access management (IAM), micro-segmentation, and continuous monitoring. Zero Trust concentrates on enacting strict identity verification, least privilege access, and policy enforcement for the most security vulnerabilities in a dynamic cloud environment where workloads are consistently changing. It also highlights that every organization will face challenges integrating Zero Trust into a Kubernetes-based environment, performance overheads, identity management, and multi-cluster and hybrid cloud deployments being just a handful. These challenges are enough to take advantage of Zero Trust’s increased visibility, granular access control, and more secure requests for access and communication. They provide insights on how Zero Trust principles apply to Kubernetes with Istio, Cilium and Kyver no while bringing best practices for enterprises that use Zero Trust principles in Kubernetes-based infrastructures. This paper highlights the effectiveness of Zero Trust in the modern account of the cloud environment aimed at securing Kubernetes-based applications.

Zero Trust Security Model (ZTSM); Kubernetes; Micro-Segmentation; Service Mesh (Istio); Identity and Access Management (IAM)

https://ijsra.net/sites/default/files/fulltext_pdf/IJSRA-2021-0007.pdf

Preview Article PDF

Nishanth Reddy Pinnapareddy. Zero trust security model implementation in Kubernetes-based cloud infrastructure. International Journal of Science and Research Archive, 2021, 01(02), 109-135. Article DOI: https://doi.org/10.30574/ijsra.2021.1.2.0007

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

          

   

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution