DESIGN OF ZERO TRUST SECURITY ARCHITECTURES FOR HIGH VALUE FINANCIAL TRANSACTION NETWORKS

Authors

Rosine Ceshi
Threat Intelligence Analyst, Angola.

Keywords:

Zero Trust Architecture, Financial Transactions, Identity Management, Micro-Segmentation, Network Security, Financial Networks, Authentication

Synopsis

As financial transactions grow in scale and sensitivity, traditional perimeter-based security models fall short against modern threats such as lateral movement, credential theft, and insider breaches. Zero Trust Security Architecture (ZTSA) shifts the paradigm from trust-by-default to continuous verification, least privilege, and micro-segmentation. This paper explores the design of ZTSA tailored for high-value financial transaction environments, drawing from legacy infrastructure challenges, regulatory demands, and evolving cyber threat landscapes.

 

References

[1] Kindervag, J. (2010). No More Chewy Centers: Introducing the Zero Trust Model. Forrester Research.

[2] Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2013). Continuous Diagnostics and Mitigation (CDM) Framework. National Institute of Standards and Technology (NIST).

[3] Anugula Sethupathy, U.K. (2018). Self-healing systems and telemetry-driven automation in DevOps pipelines. International Journal of Novel Research and Development, 3(7), 148–155. https://doi.org/10.56975/ijnrd.v3i7.309065

[4] Greene, L., Patterson, J., & Bell, M. (2016). Mitigating Insider Threats in Financial Institutions Using Identity-Based Segmentation. Journal of Cybersecurity and Trust, 4(2), 41–54.

[5] Srinivasan, R., & Li, T. (2018). Blockchain-Augmented Zero Trust Models for Financial Data Integrity. IEEE Security & Privacy, 16(6), 62–70.

[6] Kissel, R. (2013). NIST Special Publication 800-53 Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations. NIST.

[7] Chapple, M., & Seidl, D. (2018). Cybersecurity Essentials. Wiley.

[8] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. NIST Special Publication 800-145.

[9] Gilman, J., & Barth, D. (2017). Zero Trust Networks: Building Secure Systems in Untrusted Networks. O’Reilly Media.

[10] Hewett, R. J., & Becker, J. (2017). Applying Micro-Segmentation in Legacy Financial Networks. Journal of Network Security, 5(3), 21–34.

[11] Zhang, Y., & Wu, H. (2016). Network Architecture Evolution: Transitioning from Perimeter Security to Zero Trust in Financial Systems. Information Systems Journal, 26(1), 89–105.

[12] Anugula Sethupathy, U.K. (2019). Real-time inventory visibility using event streaming and analytics in retail systems. International Journal of Novel Research and Development, 4(4), 23–33. https://doi.org/10.56975/ijnrd.v4i4.309064

[13] Martin, A., & Johnson, B. (2018). Least Privilege and Access Control in Banking IT Environments. International Journal of Financial Cybersecurity, 7(2), 45–57.

[14] Howard, M., & LeBlanc, D. (2013). Writing Secure Code (2nd ed.). Microsoft Press.

[15] Scott, J., & Spaniel, D. (2016). The Rise of Cybersecurity in Financial Institutions. Center for Technology & National Security Policy, National Defense University.

[16] Office of the Comptroller of the Currency (OCC). (2019). Cybersecurity: Risk Management Principles for the Banking Sector. U.S. Department of the Treasury.

Published

September 23, 2025