4
Department of Cybersecurity and Network Resilience, University of Edinburgh, India
Abstract
The paradigm of network security is undergoing a profound transformation, moving from the legacy "castle-and-moat" defensive strategy toward the decentralized, identity-centric framework of Zero-Trust Architecture (ZTA). This transition is accelerated by the widespread adoption of microservices, cloud-native deployments, and the persistent exigencies of the post-pandemic remote work environment. This article provides a comprehensive academic analysis of the mechanisms required to secure distributed systems within the BFSI and healthcare sectors, where data sensitivity is paramount. By synthesizing recent empirical evidence on lateral movement detection, the influence of the COVID-19 pandemic on cloud adoption, and the technical requirements for API-based authentication, this research elucidates a multifaceted security strategy. The discussion focuses on the integration of JWT-based access control, consent-aware OAuth2 models, and robust monitoring frameworks within event-driven architectures. Furthermore, the article addresses the human dimensions of security, including BYOD policies and the persistent threat of insider actors. Through a theoretical exploration of de-perimeterization, the study argues that ZTA is not merely a technological implementation but a philosophical shift in organizational risk management. The results suggest that securing modern microservices requires a holistic approach that bridges API design, dynamic authorization, and real-time behavioral monitoring.
How to Cite
Bruce Hegan. (2026). Architectural Resilience in the Era of Distributed Systems: Navigating the Convergence of Zero-Trust Models and Microservices Security. Frontiers in Emerging Multidisciplinary Sciences, 3(01), 14–17. Retrieved from https://irjernet.com/index.php/fems/article/view/324
📄Aggarwal, G. (2021). How the pandemic has accelerated cloud adoption.
📄Arunprasad, P., Dey, C., Jebli, F., Manimuthu, A., & El Hathat, Z. (2022). Exploring the remote work challenges in the era of covid-19 pandemic: review and application model. Benchmarking: An International Journal, 29(10), 3333–3355.
📄Chatterjee, A., & Prinz, A. (2020). Securing HL7 FHIR APIs Using JWT-Based Access Control. International Journal of Advanced Computer Science and Applications, 11(5), 88–94.
📄Department of Defense Cybersecurity and Information Systems Agency (2021). Embracing a zero trust security model.
📄Downer, K., & Bhattacharya, M. (2022). Byod security: A study of human dimensions. Informatics, 9, 16.
📄Fawaz, A., Bohara, A., Cheh, C., & Sanders, W. H. (2016). Lateral movement detection using distributed data fusion. 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 21–30.
📄Gummadi, V. P. K. (2020). API design and implementation: RAML and OpenAPI specification. Journal of Electrical Systems, 16(4).
📄Haider, A. (2021). Covid-19 driving surge in enterprise cloud adoption - 451 survey.
📄John, K. (2010). No more chewy centers: Introducing the zero trust model of information security.
📄Joseph, D., Mark, S., & Jakub, S. (2020). Back to the future: What the jericho forum taught us about modern security.
📄Sagar Kesarpu. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12
📄Liu, C., Tan, R., Wu, Y., Feng, Y., Jin, Z., Zhang, F., Liu, Y., & Liu, Q. (2024). Dissecting zero trust: research landscape and its implementation in iot. Cybersecurity, 7(1), 20.
📄Liu, Q., Stokes, J. W., Mead, R., Burrell, T., Hellen, I., Lambert, J., Marochko, A., & Cui, W. (2018). Latte: Large-scale lateral movement detection. MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), 1–6.
📄Mousaid, H. (2020). Consent-aware OAuth2 model for healthcare microservices. International Journal of E-Health and Medical Communications, 11(4), 32–47.
📄Pranggono, B., & Arabo, A. (2021). Covid-19 pandemic cybersecurity issues. Internet Technology Letters, 4(2), e247.
📄Purvine, E., Johnson, J. R., & Lo, C. (2016). A graph-based impact metric for mitigating lateral movement cyber attacks. Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig ’16, 45–52.
📄Santos, P. A. S. M. (2020). Secure Monitoring Framework for Microservices-Based Event-Driven Architectures. Master's Thesis, Polytechnic Institute of Porto.
📄Spencer, M., & Pizio, D. (2024). The de-perimeterisation of information security: The jericho forum, zero trust, and narrativity. Social Studies of Science, 54(5), 655–677.
📄Storchak, Y. (2024). Insider threat statistics for 2024: Reports, facts, actors, and costs origin.
📄The White House (2021). Executive order on improving the nation’s cybersecurity.
📄Xi, Y., Sha, K., Shi, W., Schwiebert, L., & Zhang, T. (2007). Enforcing privacy using symmetric random key-set in vehicular networks. Eighth International Symposium on Autonomous Decentralized Systems (ISADS’07), 344–351.
📄Yao, Q., Wang, Q., Zhang, X., & Fei, J. (2021). Dynamic access control and authorization system based on zero-trust architecture. Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System, CCRIS ’20, 123–127.