{"id":10052,"date":"2025-12-10T11:07:01","date_gmt":"2025-12-10T11:07:01","guid":{"rendered":"https:\/\/kibu.ac.ke\/sgs\/?p=10052"},"modified":"2025-12-10T11:08:31","modified_gmt":"2025-12-10T11:08:31","slug":"specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/","title":{"rendered":"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10052\" class=\"elementor elementor-10052\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6823abf9 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"6823abf9\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e5c146e\" data-id=\"7e5c146e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab475 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"ab475\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d656c3e elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"d656c3e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58c1185f\" data-id=\"58c1185f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3ca42a39 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ca42a39\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-609afd9c elementor-invisible\" data-id=\"609afd9c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34845999 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"34845999\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-715b316a elementor-invisible\" data-id=\"715b316a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69be62d9 elementor-widget elementor-widget-heading\" data-id=\"69be62d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dfbac8d elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5dfbac8d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Victor Otieno Mony<\/p><p>Anselemo Peters Ikoha<\/p><p>Roselida O. Maroko<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-22431e30 elementor-invisible\" data-id=\"22431e30\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24a2300b elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"24a2300b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/www.ijset.in\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-4393de8d elementor-widget elementor-widget-heading\" data-id=\"4393de8d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68d688a8 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"68d688a8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cloud-based services&#8217; authentication mechanisms have recurring threats and vulnerabilities that cannot be solved by existing traditional mitigation strategies. As a result, cloud insecurity has been the norm of recent times, even as edge technology outsmarts mitigation mechanisms such as passwords, biometrics, and key-based protocols. In response to these cloud authentication challenges, this paper seeks to specify an ideal Zero Trust Architecture (ZTA) implementation Design that best mitigates authentication threats and vulnerabilities. To specify the ideal ZTA design, the research paper begins by examining the operational tenets of the ZTA principle of Policy Enforcement, discovered as the most effective among the five ZTA principles affecting Cloud-based services (CBS). The paper then delves into the process of ZTA design specification. The design specification process evolves around five identified cloud-based authentication threat categories, namely, Brute-force attacks, Man-in-The-Middle Attacks, Social Engineering Attacks, Password Discovery Attacks, and Denial of Service Attacks. The ZTA model design is thus performed by the research work through the Forrester ZTA framework, particularly focusing on the People and Device tenets, thereby achieving the objective of architectural specification. To achieve this, the paper builds on the ZTA principle of policy enforcement and operationalizes it through trust signals that balance usability and security. The resulting ZTA design specification enlists Keystroke Dynamics to represent user behaviour, while Device Location serves as a contextual device-based trust signal. These two elements are aligned with the \u201cPeople\u201d and \u201cDevice\u201d tenets of the Forrester ZTA model. Together, they enabled the construction of a dynamic, adaptive security mechanism capable of enforcing ZTA access policies based on real-time behavioural and contextual signals. The tailored ZTA design specified by this paper is a proposal of an innovative means of enhancing authentication security in CBS to ensure a data-driven threat mitigation process that aligns strategic dynamic security controls with the most pressing authentication threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2025 Authors Victor Otieno Mony Anselemo Peters Ikoha Roselida O. Maroko VIEW ON PUBLISHER SITE Abstract Cloud-based services&#8217; authentication mechanisms have recurring threats and vulnerabilities that cannot be solved by existing traditional mitigation strategies. As a result, cloud insecurity has been the norm of recent times, even as edge technology outsmarts mitigation mechanisms such as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-10052","post","type-post","status-publish","format-standard","hentry","category-publications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities - School of Graduate Studies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities - School of Graduate Studies\" \/>\n<meta property=\"og:description\" content=\"2025 Authors Victor Otieno Mony Anselemo Peters Ikoha Roselida O. Maroko VIEW ON PUBLISHER SITE Abstract Cloud-based services&#8217; authentication mechanisms have recurring threats and vulnerabilities that cannot be solved by existing traditional mitigation strategies. As a result, cloud insecurity has been the norm of recent times, even as edge technology outsmarts mitigation mechanisms such as [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Graduate Studies\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-10T11:07:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T11:08:31+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\"},\"headline\":\"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities\",\"datePublished\":\"2025-12-10T11:07:01+00:00\",\"dateModified\":\"2025-12-10T11:08:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\"},\"wordCount\":337,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"articleSection\":[\"Publications\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\",\"name\":\"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities - School of Graduate Studies\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\"},\"datePublished\":\"2025-12-10T11:07:01+00:00\",\"dateModified\":\"2025-12-10T11:08:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/sgs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"name\":\"School of Graduate Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\",\"name\":\"School of Graduate Studies\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"width\":1220,\"height\":1100,\"caption\":\"School of Graduate Studies\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/sgs\"],\"url\":\"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities - School of Graduate Studies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities - School of Graduate Studies","og_description":"2025 Authors Victor Otieno Mony Anselemo Peters Ikoha Roselida O. Maroko VIEW ON PUBLISHER SITE Abstract Cloud-based services&#8217; authentication mechanisms have recurring threats and vulnerabilities that cannot be solved by existing traditional mitigation strategies. As a result, cloud insecurity has been the norm of recent times, even as edge technology outsmarts mitigation mechanisms such as [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/","og_site_name":"School of Graduate Studies","article_published_time":"2025-12-10T11:07:01+00:00","article_modified_time":"2025-12-10T11:08:31+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8"},"headline":"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities","datePublished":"2025-12-10T11:07:01+00:00","dateModified":"2025-12-10T11:08:31+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/"},"wordCount":337,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"articleSection":["Publications"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/","url":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/","name":"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities - School of Graduate Studies","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#website"},"datePublished":"2025-12-10T11:07:01+00:00","dateModified":"2025-12-10T11:08:31+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/sgs\/specification-of-an-ideal-zero-trust-architecture-implementation-design-for-the-mitigation-of-cloud-based-services-authentication-threats-and-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/sgs\/"},{"@type":"ListItem","position":2,"name":"Specification Of An Ideal Zero Trust Architecture Implementation Design For The Mitigation Of Cloud-Based Services Authentication Threats And Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/sgs\/#website","url":"https:\/\/kibu.ac.ke\/sgs\/","name":"School of Graduate Studies","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/sgs\/#organization","name":"School of Graduate Studies","url":"https:\/\/kibu.ac.ke\/sgs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","contentUrl":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","width":1220,"height":1100,"caption":"School of Graduate Studies"},"image":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/sgs"],"url":"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/10052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/comments?post=10052"}],"version-history":[{"count":4,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/10052\/revisions"}],"predecessor-version":[{"id":10058,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/10052\/revisions\/10058"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/media?parent=10052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/categories?post=10052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/tags?post=10052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}