Bridging Experiment and Enterprise: Continuous Verification and Policy Enforcement in Zero Trust Microservices

Authors

  • Sireesha Devalla Frisco. TX, USA Author

Keywords:

Generative AI, Cloud Security, AWS, GuardDuty, Identity and Access Management (IAM), SageMaker, Threat Detection, Adversarial Attacks, Secure Integration, Security Framework

Abstract

Zero trust security has become a cornerstone for protecting cloud-native systems, but its orchestration in distributed microservices remains largely confined to theoretical models and controlled experiments. Bridging this gap, this paper examines how continuous verification and fine-grained policy enforcement can be operationalized in enterprise-scale, heterogeneous, and multi-cloud microservices environments. We develop a reference orchestration model that integrates service mesh capabilities, mutual TLS, identity-centric controls, and DevSecOps-driven automation pipelines. Using a mixed-method evaluation, we combine simulation-based benchmarking with case-driven analysis to assess scalability, interoperability, and operational overhead. Results demonstrate that continuous verification effectively minimizes lateral movement and enhances resilience against evolving threats, but also introduces challenges related to automation complexity, performance trade-offs, and cross-vendor interoperability. Our findings highlight the need for adaptive orchestration strategies that balance strong security guarantees with operational feasibility and cost efficiency. To address this, we propose a set of design guidelines and practical orchestration strategies for secure deployment, monitoring, and maintenance in production-grade microservices. This research contributes both empirical evidence and actionable recommendations, advancing the state of knowledge from controlled experimentation toward enterprise adoption. The study is intended for security architects, DevSecOps engineers, and platform operators seeking scalable approaches to zero trust orchestration in modern microservices ecosystems.

References

J. Kindervag, No More Chewy Centers: Introducing Zero Trust, Forrester Research, 2010.

S. Rose et al., Zero Trust Architecture, NIST SP 800-207, 2020.

V. Mavroeidis and S. Bromander, “Cybersecurity and Zero Trust in the Cloud,” IEEE Access, 2021.

N. Dragoni et al., “Microservices: Yesterday, Today, and Tomorrow,” Springer, 2017.

M. Butcher and A. Morgan, Istio: Up and Running, O’Reilly, 2019.

P. Desai et al., “Security Challenges in Microservices Architecture,” IEEE ICACCP, 2019.

A. Alshamrani et al., “Security Challenges of Cloud Microservices: A Systematic Review,” FGCS, 2019.

D. Gollmann, “Continuous Authentication in Zero Trust Environments,” IEEE S&P, 2020.

W. Zhao et al., “Runtime Verification in Cloud-Native Applications,” ACM Middleware, 2021.

R. Torres et al., “OPA for Kubernetes Policy Enforcement,” IEEE Cloud, 2020.

J. Hurst et al., “Fine-Grained Access Control in Microservices,” ACM SAC, 2021.

CNCF, SPIFFE/SPIRE Documentation, 2022.

E. B. Fernandez et al., “Patterns for Secure Cloud Applications,” Future Internet, 2019.

H. Raj et al., “Zero Trust in Practice: Lessons from Industry,” IEEE Cloud Computing, 2020.

CNCF, Whitepapers on Interoperability, 2022.

Gartner, Reports on Zero Trust and Cloud Security, 2022–2023.

H. Patel et al., “Performance Trade-offs in Microservices Security,” IEEE Access, 2020.

S. Shah and A. Dubey, “Performance and Security Trade-offs in Web Frameworks,” JSS, 2016.

C. Esposito and A. Castiglione, “Security Challenges of Next-Gen Cloud-Native Applications,” IEEE Cloud, 2021.

V. Sharma et al., “AI for Adaptive Security in Microservices,” ACM Computing Surveys, 2022.

V. Lenarduzzi et al., “Continuous Software Engineering and Resilience Practices,” IST, 2021.

Downloads

How to Cite

Sireesha Devalla. (2025). Bridging Experiment and Enterprise: Continuous Verification and Policy Enforcement in Zero Trust Microservices. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 13(2), 117-128. https://jrtcse.com/index.php/home/article/view/JRTCSE.2025.13.2.11