Frontiers in Emerging Multidisciplinary Sciences

Open Access Peer Review International
Open Access

Navigating the Zero Trust Paradigm in Healthcare: A Comprehensive Evaluation of Legacy System Modernization, Clinical Workstation Security, And Regulatory Compliance

4 Department of Cybersecurity and Health Informatics, University of Edinburgh, United Kingdom

Abstract

The rapid digitization of healthcare delivery organizations has precipitated a complex security landscape characterized by the proliferation of Internet of Medical Things (IoMT) devices and an increasing reliance on legacy infrastructure. This research provides a deep theoretical and empirical evaluation of the transition from traditional perimeter-based security to Zero Trust Architecture (ZTA) within the clinical environment. By synthesizing contemporary frameworks, including the Zero Trust Maturity Model and the Zero Trust eXtended (ZTX) ecosystem, this study examines the inherent vulnerabilities of trust as a structural flaw in network design. Central to this investigation is the challenge of bridging ZTA principles with legacy medical devices, specifically focusing on the adoption of modern operating systems like Windows 11 in hospital clinical workstations. The study employs a multivocal literature review and qualitative analysis to identify critical research gaps, such as the perception layer security in IoMT and the scalability of federated learning and blockchain in IoT-enabled healthcare. Results indicate that while ZTA significantly reduces the lateral movement of threats, the modernization of legacy systems remains a primary bottleneck due to technical debt and clinical continuity requirements. The article concludes by proposing a comprehensive roadmap for healthcare organizations to modernize their cybersecurity posture while maintaining operational efficacy, emphasizing that the elimination of implicit trust is the only viable path for securing the future of urban and regional health.

How to Cite

Dr. Elena Vance. (2026). Navigating the Zero Trust Paradigm in Healthcare: A Comprehensive Evaluation of Legacy System Modernization, Clinical Workstation Security, And Regulatory Compliance. Frontiers in Emerging Multidisciplinary Sciences, 3(01), 1–4. Retrieved from https://irjernet.com/index.php/fems/article/view/293

References

πŸ“„ Buck, C., Olenberger, C., Schweizer, A., VΓΆlter, F., & Eymann, T. (2021). Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Computers & Security, 110, 102436.
πŸ“„ Campbell, M. (2020). Beyond zero trust: trust is a vulnerability. Computer (Long Beach Calif), 53(10), 110-113.
πŸ“„ CISA. (2021). Zero Trust Maturity Model. Cybersecurity and Infrastructure Security Agency.
πŸ“„ Creswell, J. W., & Creswell, J. D. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (Fifth ed.). SAGE Publications, Inc.
πŸ“„ Cunningham, C. (2018). The Zero Trust eXtended (ZTX) Ecosystem. Forrester.
πŸ“„ Cunningham, C., Holmes, D., & Pollard, J. (2019). The eight business and security benefits of zero trust. Forrester Research.
πŸ“„ Debnath, S. (2023). Integrating Information Technology in Healthcare: Recent Developments, Challenges, and Future Prospects for Urban and Regional Health. World Journal of Advanced Research and Reviews, 19(1), 455-463.
πŸ“„ Deloitte. (2021). A revolutionary approach to Cyber or just another buzz word? Deloitte Risk Advisory.
πŸ“„ Duvvur, V. (2022). Securing the Future: Strategies for Modernizing Legacy Systems and Enhancing Cybersecurity. Journal of Artificial Intelligence & Cloud Computing, 1(3), 1-3.
πŸ“„ Eastwood, B. (2024). Tips for Health Systems on Managing Legacy Systems to Strengthen Security. HealthTech Magazine.
πŸ“„ Gellert, G. A., et al. (2023). Zero Trust and The Future of Cybersecurity in Healthcare Delivery Organizations. Journal of Hospital Administration, 12(1), 1-8.
πŸ“„ IEEE. (2017). International Conference on Communication Technologies (ComTech 2017). Institute of Electrical and Electronics Engineers, Rawalpindi, Pakistan.
πŸ“„ Khan, M. J. (2023). Zero Trust Architecture: Redefining Network Security Paradigms in the Digital Age. World Journal of Advanced Research and Reviews, 19(3), 105-116.
πŸ“„ Nayeem, M. (2026). Bridging Zero-Trust Security and Legacy Medical Devices: An Evaluation of Windows 11 Adoption in Hospital Clinical Workstations. Frontiers in Emerging Artificial Intelligence and Machine Learning, 3(1), 01–08.
πŸ“„ Shojaei, P., Vlahu-Gjorgievska, E., & Chow, Y. W. (2024). Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review. Computers, 13(2), 1-25.
πŸ“„ Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2022). Zero trust architecture (ZTA): A comprehensive survey. IEEE Access, 10, 57143–57179.
πŸ“„ Teerakanok, S., Uehara, T., & Inomata, A. (2021). Migrating to zero-trust architecture: Reviews and challenges. Security and Communication Networks, 2021, 9947347.
πŸ“„ Tyler, D., & Viana, T. (2021). Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture. Applied Sciences, 11(16), 1-18.
πŸ“„ Waheed, N., Rehman, A. U., Nehra, A., et al. (2023). FedBlockHealth: Federated learning & blockchain in IoT-enabled healthcare. arXiv.
πŸ“„ Wu, L. (2022). IoHT and Zero Trust at perception layer. Cybersecurity Journal, 2022(3), 210–225.
πŸ“„ Yan, X., & Wang, Y. (2020). Comprehensive survey of Zero Trust. IEEE Transactions.