Secure Cloud Native Microservices Architecture with Zero Trust Network Access Controls and Multi Layered Encryption for Resilient Distributed Systems

Authors

  • Lukman Medriavin Silalahi President University
  • Imelda Uli Vistalina Simanjuntak Universitas Mercu Buana
  • Hayadi Hamuda Universitas Pamulang
  • Irfan Kampono Research Center for Oceanology (Badan Riset dan Inovasi Nasional)
  • Agus Dendi Rochendi Research Center for Oceanology (Badan Riset dan Inovasi Nasional)
  • Abdul Hamid Universiti Tun Hussein Onn Malaysia

Keywords:

Microservices Architecture, Data Encryption, Security Layers, Threat Mitigation, Zero Trust Security

Abstract

The increasing adoption of cloud native microservices has brought about significant improvements in scalability, flexibility, and resilience. However, these advancements also introduce substantial security challenges, particularly in distributed environments where traditional perimeter-based security models prove inadequate. This paper proposes a secure architecture for cloud native microservices that integrates Zero trust Network Access (ZTNA) and multi layered encryption techniques to address these security concerns. The architecture operates on the principle of "never trust, always verify," ensuring that access to resources is strictly controlled and continuously monitored. By incorporating multi layered encryption methods such as RSA and AES, the architecture ensures data protection both in transit and at rest, significantly reducing the risk of data breaches and unauthorized access. Through experimental evaluations, the proposed architecture demonstrated its effectiveness in preventing lateral movement, mitigating data leakage, and resisting common attack vectors such as man-in-the-middle (MITM) attacks and privilege escalation. Additionally, the performance of the system remained optimal, with minimal overhead despite the additional security layers. The architecture's scalability and robust security mechanisms make it a viable solution for real-world microservices environments, where both security and performance are crucial. This paper discusses the potential impact of this secure architecture on the broader field of distributed system security and offers recommendations for future work, including the integration of advanced machine learning techniques for real-time threat detection and automated responses, as well as the adaptation of the architecture for emerging technologies like edge computing and 6G networks.

References

[1] B. M. Harve et al., “The Cloud-Native Revolution: Microservices in a Cloud-Driven World,” in 2024 International Conference on Intelligent Cybernetics Technology and Applications, ICICyTA 2024, 2024, pp. 1043 – 1048. doi: 10.1109/ICICYTA64807.2024.10913359.

[2] D. Gannon, R. Barga, and N. Sundaresan, “Cloud-Native Applications,” IEEE Cloud Comput., vol. 4, no. 5, pp. 16 – 21, 2017, doi: 10.1109/MCC.2017.4250939.

[3] T. Theodoropoulos et al., “Security in Cloud-Native Services: A Survey,” J. Cybersecurity Priv., vol. 3, no. 4, pp. 758 – 793, 2023, doi: 10.3390/jcp3040034.

[4] S. Beahan, F. Ullah, L. Chalmers, U. Fatima, and M. Shahin, “Characterizing Vulnerabilities in Microservices: Source, Age and Severity,” in Proceedings - 2025 IEEE 22nd International Conference on Software Architecture, ICSA 2025, 2025, pp. 96 – 106. doi: 10.1109/ICSA65012.2025.00019.

[5] U. Faseeha, H. Jamil Syed, F. Samad, S. Zehra, and H. Ahmed, “Observability in Microservices: An In-Depth Exploration of Frameworks, Challenges, and Deployment Paradigms,” IEEE Access, vol. 13, pp. 72011 – 72039, 2025, doi: 10.1109/ACCESS.2025.3562125.

[6] R. K. Rajendran, T. Mohana Priya, S. Goundar, K. Reddy Madhavi, J. Avanija, and B. R. Avula, Zero Trust Architecture in Cloud Security. 2024. doi: 10.4018/979-8-3693-6859-6.ch024.

[7] S. Berlato, M. Rizzi, M. Franzil, S. Cretti, P. De Matteis, and R. Carbone, “Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications,” in Proceedings - 9th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024, 2024, pp. 706 – 711. doi: 10.1109/EuroSPW61312.2024.00086.

[8] A. Fatima, C. K. Kumar, S. U. Panjathan, and S. Doss, The security implications of microservices in modern software development. 2025. doi: 10.4018/979-8-3373-0365-9.ch014.

[9] S. Shao et al., “Master-slave multi-chain with risk assessment based access control model for zero trust network,” Peer-to-Peer Netw. Appl., vol. 18, no. 6, 2025, doi: 10.1007/s12083-024-01853-1.

[10] M. A. Azad, S. Abdullah, J. Arshad, H. Lallie, and Y. H. Ahmed, “Verify and trust: A multidimensional survey of zero-trust security in the age of IoT,” Internet of Things (Netherlands), vol. 27, 2024, doi: 10.1016/j.iot.2024.101227.

[11] I. Parkhomenko, L. Myrutenko, R. Ohiievych, and M. Savonik, “Using Zero Trust Principles for Detecting Authorization Attacks in Cloud Environments,” in CEUR Workshop Proceedings, 2024, pp. 181 – 195. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85217276838&partnerID=40&md5=0234e7543d131876206fac063b62a84c

[12] M. J. C. Samonte, J. E. R. Aparize, J. M. Geronimo, and C. C. Orino, “Implementing Zero Trust Security in Microservice Architecture of Electronic Health Record,” in 2024 4th International Conference on Computer Systems, ICCS 2024, 2024, pp. 98 – 105. doi: 10.1109/ICCS62594.2024.10795827.

[13] A. K. Alnaim and A. M. Alwakeel, “Zero-Trust Mechanisms for Securing Distributed Edge and Fog Computing in 6G Networks,” Mathematics, vol. 13, no. 8, 2025, doi: 10.3390/math13081239.

[14] S. R. Shinde, S. Gade, T. Singh, D. G. Takale, P. Shingare, and S. Kanathia, “Zero trust security architecture enhanced with federated learning for modern network environments,” in EPJ Web of Conferences, 2025. doi: 10.1051/epjconf/202534101021.

[15] C. Dong et al., “Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture,” in Proceedings - 2023 IEEE International Conference on Blockchain, Blockchain 2023, 2023, pp. 315 – 322. doi: 10.1109/Blockchain60715.2023.00056.

[16] S. R. Chitla, S. Pooja, and M. Shukla, “Symmetric key generation using integrated system of multi-modal biometrics and user-password,” J. Eng. Appl. Sci., vol. 12, no. Specialissue9, pp. 8657 – 8660, 2017, doi: 10.3923/jeasci.2017.8657.8660.

[17] R. S. Durge and V. M. Deshmukh, “Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization,” Int. J. Electr. Comput. Eng., vol. 14, no. 4, pp. 4306 – 4314, 2024, doi: 10.11591/ijece.v14i4.pp4306-4314.

[18] T. Kaur, K. Wason, M. Aggarval, L. Sharma, P. Duggal, and S. Gautam, Mitigating the Risk of Lateral Movement Within a Network. 2025. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-105018287332&partnerID=40&md5=3122df49c7cd9c729c94992bbe880d7e

[19] P. Chinnasamy, P. Deepalakshmi, D. Sandeep, A. S. Ganesh, A. J. Krishna, and D. D. Priya, “Enhancing Healthcare Record Privacy Through the Integration of Visual Cryptography and Diverse Image Encryption Techniques,” in Proceedings of the 9th International Conference on Communication and Electronics Systems, ICCES 2024, 2024, pp. 880 – 885. doi: 10.1109/ICCES63552.2024.10859628.

[20] M. Kotenko, D. Moskalyk, V. Kovach, and V. Osadchyi, “Navigating the challenges and best practices in securing microservices architecture,” in CEUR Workshop Proceedings, 2024, pp. 1 – 16. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85210245358&partnerID=40&md5=e1a9aff2b393c418f88b9cc3b8a06af8

[21] N. R. P. Hutasuhut, M. G. Amri, and R. F. Aji, “Security Gap in Microservices: A Systematic Literature Review,” Int. J. Adv. Comput. Sci. Appl., vol. 15, no. 12, pp. 165 – 171, 2024, doi: 10.14569/IJACSA.2024.0151218.

[22] X. Qiu et al., “Data Encryption and Secure Transmission of Electric Power Mobile Terminal with Microservices Architecture,” Lect. Notes Data Eng. Commun. Technol., vol. 235, pp. 651 – 661, 2025, doi: 10.1007/978-981-96-0211-7_60.

[23] W. Tang, X. He, T. Wang, and Z. Wang, “H-HMPP: A Heterogeneity-Based Microservice Deployment Method for Security Enhancement,” in Proceedings - 2025 IEEE International Conference on Software Services Engineering, SSE 2025, 2025, pp. 132 – 142. doi: 10.1109/SSE67621.2025.00025.

Downloads

Published

2026-01-19