Uche James, Ugoaghalam and Matthew Ijiga, Onuh and Anebi Enyejo, Lawrence (2025) Zero Trust Network Access Enforcement for Securing Multi-Slice Architectures in 5G Private Enterprise Deployments. International Journal of Innovative Science and Research Technology, 10 (8): 25aug323. pp. 64-78. ISSN 2456-2165
The evolution of 5G technology and the proliferation of network slicing have revolutionized private enterprise deployments by offering customizable, low-latency, and high-bandwidth services tailored to diverse operational needs. However, this paradigm introduces complex security challenges, particularly in maintaining isolated, resilient, and trustworthy network environments across multiple slices. This review explores the integration of Zero Trust Network Access (ZTNA) principles within multi-slice 5G architectures to fortify enterprise security postures. Emphasizing a “never trust, always verify” model, the paper critically evaluates how ZTNA frameworks enforce least privilege access, continuous identity verification, and adaptive threat detection across heterogeneous network slices. The discussion extends to the interplay between software-defined perimeters, AI-enhanced anomaly detection, and policy-based segmentation to address insider threats, lateral movement, and dynamic endpoint authentication. The paper reviews current industry standards, architectural blueprints, and practical deployment scenarios, shedding light on scalability, performance trade-offs, and regulatory compliance. Ultimately, this study provides a forward-looking perspective on embedding ZTNA into the DNA of 5G private networks to ensure secure, reliable, and agile enterprise operations.
Altmetric Metrics
Dimensions Matrics
Downloads
Downloads per month over past year
![]() |