Abstract: The cloud-edge computing phenomenon and distributed digital infrastructure have exposed inherent limitations within perimeter-based security paradigms. Zero Trust Architecture (ZTA) on the ...