{"id":9728,"date":"2025-12-09T11:54:30","date_gmt":"2025-12-09T11:54:30","guid":{"rendered":"https:\/\/kibu.ac.ke\/sgs\/?p=9728"},"modified":"2025-12-09T11:56:17","modified_gmt":"2025-12-09T11:56:17","slug":"evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/","title":{"rendered":"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &#038; Vulnerabilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9728\" class=\"elementor elementor-9728\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9153209 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"9153209\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42e873b2\" data-id=\"42e873b2\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2186875b elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"2186875b\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &#038; Vulnerabilities<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-167788d9 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"167788d9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d178a4c\" data-id=\"2d178a4c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-28f1204 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28f1204\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2c6cf08d elementor-invisible\" data-id=\"2c6cf08d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47ea83e6 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"47ea83e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-63a3c92 elementor-invisible\" data-id=\"63a3c92\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35444e3e elementor-widget elementor-widget-heading\" data-id=\"35444e3e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e9158d7 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2e9158d7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Victor Otieno Mony<\/p><p>Anselemo Peters Ikoha<\/p><p>Roselida O. Maroko<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-52a57204 elementor-invisible\" data-id=\"52a57204\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41c97ee6 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"41c97ee6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/ijsret.com\/2025\/08\/20\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-3322b2b4 elementor-widget elementor-widget-heading\" data-id=\"3322b2b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5483520d elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5483520d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The increasing complexity of cyber threats and the widespread adoption of cloud-based services have significantly exposed traditional authentication mechanisms to evolving vulnerabilities. To try and reduce the veracity of these threats, several mitigation mechanisms such as Multifactor and Two Factor Authentication, Biometric Authentication, Key Hashing Protocols, among others, have been employed. However, existing mitigation strategies have proven insufficient in addressing the dynamic nature of CBS authentication threats and vulnerabilities. In response, this paper looks at alternative, better cloud-based authentication mitigation mechanisms through the adoption of Zero Trust Architecture paradigms. The Paper evaluates the five Zero Trust Principles against five cloud-based authentication attack vectors for effectiveness in reducing cloud-based threats and vulnerabilities. The cloud-based authentication-related Zero Trust principles evaluated by this paper are the principles of Least Privilege, Continuous Monitoring, Encryption, Strong Authentication, and Policy Enforcement. The five authentication threat categories whose attack vectors have been used in the evaluation process are Brute Force Attacks, Denial of Service Attacks, Social Engineering Attacks, Man-in-the-Middle Attacks, and Password Discovery Attacks. The evaluation process involves analysing the ZTA principles against the five authentication threats and vulnerabilities attack vectors to determine effectiveness. The results the evaluation indicate that the ZTA principle of Policy Enforcement has the broadest impact across all five threat categories, while the other evaluated Zero Trust principles offer only partial mitigation to cloud-based authentication threats. This is because the Zero Trust principle of Policy Enforcement has a deeper, comprehensive coverage across the selected threat vectors and encompasses a higher number of Zero Trust sub-principles. The paper thus concludes that the Zero Trust principle of policy enforcement is the most suitable foundation for designing a threat-responsive ZTA implementation scheme.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2025 Authors Victor Otieno Mony Anselemo Peters Ikoha Roselida O. Maroko VIEW ON PUBLISHER SITE Abstract The increasing complexity of cyber threats and the widespread adoption of cloud-based services have significantly exposed traditional authentication mechanisms to evolving vulnerabilities. To try and reduce the veracity of these threats, several mitigation mechanisms such as Multifactor and Two [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-9728","post","type-post","status-publish","format-standard","hentry","category-publications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &amp; Vulnerabilities - School of Graduate Studies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &amp; Vulnerabilities - School of Graduate Studies\" \/>\n<meta property=\"og:description\" content=\"2025 Authors Victor Otieno Mony Anselemo Peters Ikoha Roselida O. Maroko VIEW ON PUBLISHER SITE Abstract The increasing complexity of cyber threats and the widespread adoption of cloud-based services have significantly exposed traditional authentication mechanisms to evolving vulnerabilities. To try and reduce the veracity of these threats, several mitigation mechanisms such as Multifactor and Two [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Graduate Studies\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T11:54:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T11:56:17+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\"},\"headline\":\"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &#038; Vulnerabilities\",\"datePublished\":\"2025-12-09T11:54:30+00:00\",\"dateModified\":\"2025-12-09T11:56:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\"},\"wordCount\":304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"articleSection\":[\"Publications\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\",\"name\":\"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats & Vulnerabilities - School of Graduate Studies\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\"},\"datePublished\":\"2025-12-09T11:54:30+00:00\",\"dateModified\":\"2025-12-09T11:56:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/sgs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &#038; Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"name\":\"School of Graduate Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\",\"name\":\"School of Graduate Studies\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"width\":1220,\"height\":1100,\"caption\":\"School of Graduate Studies\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/sgs\"],\"url\":\"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats & Vulnerabilities - School of Graduate Studies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats & Vulnerabilities - School of Graduate Studies","og_description":"2025 Authors Victor Otieno Mony Anselemo Peters Ikoha Roselida O. Maroko VIEW ON PUBLISHER SITE Abstract The increasing complexity of cyber threats and the widespread adoption of cloud-based services have significantly exposed traditional authentication mechanisms to evolving vulnerabilities. To try and reduce the veracity of these threats, several mitigation mechanisms such as Multifactor and Two [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/","og_site_name":"School of Graduate Studies","article_published_time":"2025-12-09T11:54:30+00:00","article_modified_time":"2025-12-09T11:56:17+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8"},"headline":"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &#038; Vulnerabilities","datePublished":"2025-12-09T11:54:30+00:00","dateModified":"2025-12-09T11:56:17+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/"},"wordCount":304,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"articleSection":["Publications"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/","url":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/","name":"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats & Vulnerabilities - School of Graduate Studies","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#website"},"datePublished":"2025-12-09T11:54:30+00:00","dateModified":"2025-12-09T11:56:17+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-effectiveness-of-zero-trust-architecture-principles-in-reducing-cloud-based-authentication-threats-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/sgs\/"},{"@type":"ListItem","position":2,"name":"Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats &#038; Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/sgs\/#website","url":"https:\/\/kibu.ac.ke\/sgs\/","name":"School of Graduate Studies","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/sgs\/#organization","name":"School of Graduate Studies","url":"https:\/\/kibu.ac.ke\/sgs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","contentUrl":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","width":1220,"height":1100,"caption":"School of Graduate Studies"},"image":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/sgs"],"url":"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/comments?post=9728"}],"version-history":[{"count":4,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9728\/revisions"}],"predecessor-version":[{"id":9733,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9728\/revisions\/9733"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/media?parent=9728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/categories?post=9728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/tags?post=9728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}