Current Volume 9
The exponential digitalization of the healthcare industry has ushered in an era of establishing electronic health records (EHRs), health and medical wearables, and cloud-connected diagnostic systems as bases for clinical operations. While this transformation has impacted the healthcare infrastructure, it has also exposed it to increasingly complex and persistent cyber threats, including ransomware, phishing campaigns, insider breaches, and unauthorized access to sensitive patient data. Traditional perimeter-based cybersecurity models once thought to be sufficient, have proven insufficient in protecting against sophisticated attackers who exploit internal vulnerabilities and employ lateral movement techniques. The evolution of these risks gave rise to the emergence of ZTA (Zero Trust Architecture), which represents a paradigm shift in the mind of "never trust, always verify." This paper focuses on the implementation of ZTA in healthcare systems, highlighting its collaboration with AI for real-time threat detection and with IoMT for secure device access and telemetry. We propose an integrated ZTA approach explicitly tailored to healthcare environments, drawing heavily on state-of-the-art AI-enabled anomaly detection, federated learning, and micro-segmentation. The effectiveness of this framework in breach detection, access policy enforcement, and system resilience was assessed through case-based analysis and simulated threat modeling. Results demonstrate that AI-enabled ZTA approaches significantly decrease false positives, increase the accuracy of detection, and reduce the lateral propagation of threats in sophisticated healthcare environments. Aspects posing practical challenges for deployment, such as interoperability, HIPAA and GDPR compliance, and resource constraints on legacy medical devices, are given further attention. Hence, offering the position of studying ZTA supported by intelligent automation is not merely a technical enhancement but rather an evolution that must be embraced to protect the digital health ecosystem from increased cyber threats. Along the same lines, future work will involve exploring blockchain integration, enhancing edge AI paradigms, and setting up dynamic trust scoring for contextual access control.
Zero Trust Architecture, Healthcare Cybersecurity, AI in Healthcare, Internet of Medical Things (IoMT), Electronic Health Records (EHR), Anomaly Detection, Access Control, Federated Learning, Medical Device Security, HIPAA Compliance, Threat Detection, Microsegmentation, Identity and Access Management (IAM), Cyber Threat Intelligence, Data Privacy
IRE Journals:
Ahmad Ikram
"Zero Trust Architecture for Healthcare: Reinventing Cybersecurity in the Age of AI and IoT-Driven Patient Data" Iconic Research And Engineering Journals Volume 8 Issue 12 2025 Page 1523-1534
IEEE:
Ahmad Ikram
"Zero Trust Architecture for Healthcare: Reinventing Cybersecurity in the Age of AI and IoT-Driven Patient Data" Iconic Research And Engineering Journals, 8(12)