Department
Computer Science and Cybersecurity
Document Type
Poster
Abstract
Over the past decade, Zero Trust Architecture (ZTA) has emerged as a leading cybersecurity framework in modern network defense. As a direct response to increasingly sophisticated cyber threats, ZTA aims to eliminate implicit trust by enforcing continuous verification of end users, devices, and networks through strategies such as multifactor authentication (MFA) and least privilege access, reflecting the principle of “never trust, always verify”. However, existing research and strategies on ZTA primarily focus on software and network-layer policies, often overlooking the significance of zero trust hardware capabilities. This poster analyzes peer-reviewed research to examine how hardware visibility, identity management, and access control bolster the defense capabilities and integrity of Zero Trust Architecture. Findings indicate that while ZTA directly and effectively addresses modern security challenges, it leaves room for hardware-level threats, including spoofed or rogue devices and unmanaged endpoints (BYOD, Shadow IT)
Publication Date
Spring 4-9-2026
Recommended Citation
Remember to check citations for accuracy before including them in your work.
Mohamed, Ridwan, "The Role of Hardware in Zero Trust Architecture" (2026). Student Scholarship. 49.
https://metroworks.metrostate.edu/student-scholarship/49
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Comments
Spring 2026: Student Research Conference