AI and Zero-Trust Architecture for Securing Data in Remote Work Settings: A Comparative Study

Article Sidebar

Main Article Content

Marianne Ghilyn V. Golo
Eduardo R. Yu II
Reagan B. Ricafort

The COVID19 pandemic accelerated remote and hybrid work adoption, exposing organizations to insider threats, data breaches, and advanced cyberattacks, which traditional perimeter-based models failed to address; in response, Zero Trust Architecture (ZTA) emerged, and its integration with Artificial Intelligence (AI) has become a cornerstone of cybersecurity strategies by enabling anomaly detection, automated policy enforcement, and rapid incident response. Guided by PRISMA methodology and Rapid review principles, this study systematically examined 25 publications from 2020–2030 across IEEE Xplore, ACM Digital Library, MDPI, SpringerLink, Elsevier, government repositories, and open access archives, applying strict eligibility criteria to ensure methodological transparency and relevance. Findings consistently show that AI-ZTA integration mitigates insider threats, prevents data breaches, and strengthens resilience against advanced cyberattacks, with chronological analysis revealing a progression from foundational frameworks (2020–2023), to risk-oriented literature (2024), applied deployments (2024–2025), and predictive analyses (2025–2026). The review concludes that AI-ZTA is positioned as a critical paradigm for securing decentralized environments, though its long-term success depends on safeguards, workforce training, regulatory compliance, and continuous evaluation mechanisms. This scope and format are consistent with established practices in cybersecurity research, where recent studies have also synthesized fewer than 25 papers through rapid review methods to deliver timely, rigorous, and actionable insights in emerging fields.

AI and Zero-Trust Architecture for Securing Data in Remote Work Settings: A Comparative Study. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(4), 381-400. https://doi.org/10.51583/IJLTEMAS.2026.150400034

Downloads

References

Ajimatanrareje, G. A., & Agbesi, J. S. (2025c). AI-Powered Zero Trust Architectures for Critical Infrastructure Protection: A Comprehensive framework for Next-Generation CyberSecurity. International Journal of Scientific Research and Modern Technology., 40–56. https://doi.org/10.38124/ijsrmt.v4i9.792

Ajish, D. (2024b). The significance of artificial intelligence in zero trust technologies: a comprehensive review. Journal of Electrical Systems and Information Technology, 11(1). https://doi.org/10.1186/s43067-024-00155-z

Campbell, R. (2026). Zero Trust for AI Systems: A reference architecture and assurance framework. Preprints.org. https://doi.org/10.20944/preprints202602.0085.v1

Cao, Y., Pokhrel, S. R., Zhu, Y., Doss, R., & Li, G. (2024). Automation and Orchestration of Zero Trust architecture: Potential solutions and challenges. Machine Intelligence Research, 21(2), 294–317. https://doi.org/10.1007/s11633-023-1456-2

Chawande, S. (2024). Adaptive zero trust with AI and Automation. World Journal of Advanced Engineering Technology and Sciences, 13(2), 751–763. https://doi.org/10.30574/wjaets.2024.13.2.0589

Chokkanathan, K., Karpagavalli, S., Priyanka, G., Vanitha, K., Anitha, K., & Shenbagavalli, P. (2024). AI-Driven Zero Trust Architecture: Enhancing Cyber-Security resilience. Proceedings of CSITSS 2024, 1–6. https://doi.org/10.1109/csitss64042.2024.10816746

CISA. (2023). Zero Trust Maturity Model. https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf

Cloud Security Technical Reference Architecture. (2022). Federal Risk and Authorization Management Program. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/sites/default/files/publications/Cloud%20Security%20Technica l%20Reference%20Architecture.pdf Top Strategic Technology Trends for 2026

Gambo, M. L., & Almulhem, A. (2025). Zero Trust Architecture: A Systematic Literature Review. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2503.11659

Gartner. (2026). Zero trust 2030 – Business operating system. Gartner Research. https://www.gartner.com/en/articles/top-technology-trends-2026

Gartner. (2023, January 27). Gartner predicts growth in zero-trust programs by 2026, despite unprotected areas vulnerabilities. Business of Tech. https://businessof.tech/2023/01/27/gartner-predicts-growth-in-zero-trust-programsby-2026-despite-unprotected-areas-vulnerabilities

Karamchand, G. (2024). Zero trust and AI: A synergistic approach to next-generation cyber threat mitigation. World Journal of Advanced Research and Reviews, 24(3), 3374–3387. https://doi.org/10.30574/wjarr.2024.24.3.3883

Liman Gambo, M., & Almulhem, A. (2025). Zero trust architecture: A systematic literature review. Journal of Network and Systems Management. https://doi.org/10.1007/s10922-025-09998-x

Nizamuddin, M. Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies. Int. J. Inf. Secur. 24, 187 (2025). https://doi.org/10.1007/s10207-025-01095-z

NSTAC. (2022). Zero trust and trusted identity management: Report to the President. National Security Telecommunications Advisory Committee.

https://www.cisa.gov/sites/default/files/publications/NSTAC%20Report%20to%20th e%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Manag ement.pdf

Nzeako, C., & Shittu, A. (2024). Implementing zero trust security models in cloud computing environments. World Journal of Advanced Research and Reviews, 24(3), 1647–1660. https://doi.org/10.30574/wjarr.2024.24.3.3500

Ofili, B. T., Erhabor, E. O., & Obasuyi, T. (2025). Enhancing federal cloud security with AI: Zero trust, threat intelligence and CISA compliance. World Journal of Advanced Research and Reviews, 25(2), 2377–2400. https://doi.org/10.30574/wjarr.2025.25.2.0620

Paul, J., Kessie, J. D., & Salawudeen, M. D. (2024). Zero trust architecture and AI: A synergistic approach to next-generation cybersecurity frameworks. International Journal of Science and Research Archive, 13(2), 4159–4169. https://doi.org/10.30574/ijsra.2024.13.2.2583

Rodrigues, A. (2026). AI-integrated zero trust architectures: A socio-technical analysis of unified enterprise cybersecurity platforms. International Journal for Research in Applied Science and Engineering Technology, 14(1), 946–953. https://doi.org/10.22214/ijraset.2026.76981

Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020d). Zero trust architecture. https://doi.org/10.6028/nist.sp.800-207

Sabin, J. (2021). The future of security in a remote-work environment. Network Security, 2021(10), 15–17. https://doi.org/10.1016/s1353-4858(21)00118-5

Sastry, R. (2025). Zero trust architecture implementation in dynamic workforce environments. International Journal of Computer Engineering and Technology, 16(1), 92–99. https://doi.org/10.34218/IJCET_16_01_092

Srivastava, S. (2025). Real time AI-driven threat detection with the integration of zero trust security framework. TEJAS Journal of Technologies and Humanitarian Science, 4(4), 25–37. https://doi.org/10.63920/tjths.44004

Ucheji, C. (2026). The future of zero-trust security architecture with AI automation. International Journal of Research and Scientific Innovation, 13(1), 700–713. https://doi.org/10.51244/ijrsi.2026.13010060

Ueno, H., Sawa, Y., Kim, J., Urakami, T., Oura, K., & Seaborn, K. (2024). Trust in human-AI interaction: Scoping out models, measures, and methods. Proceedings of the CHI Conference on Human Factors in Computing Systems Extended Abstracts, 1–7. https://doi.org/10.1145/3491101.3519772

Xu, J., Gondal, I., Yi, X., Susnjak, T., Watters, P., & McIntosh, S. (2025). The erosion of cybersecurity zero-trust principles through generative AI: A survey on the challenges and future directions. Journal of Cybersecurity and Privacy, 5(4), 87. https://doi.org/10.3390/jcp5040087

Zakhmi, K., Ushmani, A., Mohanty, M. R., Agrawal, S., Banduni, A., & Rao, S. S. K. (2025). Evolving zero trust architectures for AI-driven cyber threats in healthcare and other high-risk data environments: A systematic review. Cureus. https://doi.org/10.7759/cureus.85446

Article Details

How to Cite

AI and Zero-Trust Architecture for Securing Data in Remote Work Settings: A Comparative Study. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(4), 381-400. https://doi.org/10.51583/IJLTEMAS.2026.150400034