17–18 Sept 2025
School of Sciences, Bengaluru, India
Asia/Kolkata timezone

This is a sandbox server intended for trying out Indico. It should not be used for real events and any events on this instance may be deleted without notice.

Zero Trust Architecture in Digital Forensics: Underlying Vulnerabilities.

Not scheduled
20m
Conference Hall (School of Sciences, Bengaluru, India)

Conference Hall

School of Sciences, Bengaluru, India

Jain University School Of Sciences, JC Road, 34, 1st Cross Rd, Near Ravindra Kalakshetra, Sampangi Rama Nagara, Sudhama Nagar, Bengaluru, Karnataka 560027
Poster Forensic Sciences

Speaker

Sakshi N Basutkar (JAIN (Deemed-to-be University))

Description

The increasing sophistication of cyber incidents and distributed infrastructures has intensified the need for security models that support both resilience and evidentiary reliability. Zero Trust Architecture (ZTA), built on the principle of “never trust, always verify,” represents a significant departure from perimeter-based security by embedding continuous authentication, dynamic policy enforcement, and least-privilege access across systems. For digital forensics, ZTA offers distinct advantages: comprehensive logging, high-resolution telemetry, and strong identity verification generate valuable metadata that strengthens attribution, incident reconstruction, and legal admissibility. Proactive evidence capture and compliance-oriented monitoring further contribute to forensic readiness. However, ZTA also introduces challenges that complicate the reliability of digital evidence. Dependence on identity management systems risks compromised audit trails, insider misuse may appear legitimate within logs, and policy misconfigurations or excessive data volumes can obscure relevant artifacts. Moreover, issues of log integrity, third-party dependencies, and jurisdictional restrictions in cloud environments may undermine evidentiary trust. This paper contributes by systematically analyzing these forensic implications, highlighting both the strengths and vulnerabilities of ZTA, and proposing safeguards such as tamper-evident storage, behavioral analytics, automation, and integrated forensic readiness measures. ZTA, when fortified with these safeguards, can evolve from a security paradigm into a framework that enhances both cyber defense and forensic reliability.

Keywords: Zero Trust Architecture (ZTA); Digital Forensics; Forensic Readiness; Evidence Integrity; Insider Threats; Cybersecurity Investigations

Author

Sakshi N Basutkar (JAIN (Deemed-to-be University))

Co-author

Mr VISHNU VENKATESH NATARAJAN (JAIN (Deemed-to-be University))

Presentation materials

There are no materials yet.