Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2025 Jun 5;17(6):e85446.
doi: 10.7759/cureus.85446. eCollection 2025 Jun.

Evolving Zero Trust Architectures for AI-Driven Cyber Threats in Healthcare and Other High-Risk Data Environments: A Systematic Review

Affiliations
Review

Evolving Zero Trust Architectures for AI-Driven Cyber Threats in Healthcare and Other High-Risk Data Environments: A Systematic Review

Kanwarjit Zakhmi et al. Cureus. .

Abstract

The rapid adoption of artificial intelligence (AI) in healthcare and other high-risk environments has introduced sophisticated cyber threats that challenge traditional security models. Zero Trust Architecture (ZTA), with its principle of "never trust, always verify," has emerged as a promising framework to counter these evolving risks. This systematic review examines the current state of ZTA implementations in mitigating AI-driven cyber threats, focusing on healthcare systems, and identifies gaps between theoretical principles and real-world applications. Following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 guidelines, we conducted a comprehensive search across five databases (IEEE Xplore, PubMed, Scopus, Web of Science, and ACM Digital Library), identifying 299 records. After removing duplicates and screening for relevance, 15 studies met the inclusion criteria. These studies were analyzed for themes related to ZTA components, AI threat mitigation, implementation challenges, and ethical considerations. The Mixed Methods Appraisal Tool (MMAT) was used to assess methodological quality and risk of bias. The review revealed that while ZTA principles are well-suited to address AI-driven threats, particularly through explainable AI (XAI) and continuous monitoring, significant gaps persist in standardization, empirical validation, and stakeholder trust. Key findings include (1) a lack of metrics to evaluate ZTA efficacy against adversarial AI; (2) ethical and regulatory hurdles, such as algorithmic bias and data privacy concerns; and (3) operational barriers like interoperability issues and clinician resistance. Only four of the 15 studies provided real-world evidence of ZTA implementations, highlighting a critical research-practice divide. ZTA represents a transformative approach to cybersecurity in AI-augmented environments, but its potential remains underutilized due to theoretical dominance and implementation challenges. Future efforts must prioritize interdisciplinary collaboration, standardized frameworks, and pilot studies to bridge these gaps. Without actionable advancements, ZTA risks being outpaced by the very AI threats it seeks to mitigate. This review underscores the urgent need for adaptive, evidence-based ZTA models tailored to high-risk sectors, such as healthcare.

Keywords: ai-driven cyber threats; explainable ai; healthcare cybersecurity; systematic review; zero trust architecture.

PubMed Disclaimer

Conflict of interest statement

Conflicts of interest: In compliance with the ICMJE uniform disclosure form, all authors declare the following: Payment/services info: All authors have declared that no financial support was received from any organization for the submitted work. Financial relationships: All authors have declared that they have no financial relationships at present or within the previous three years with any organizations that might have an interest in the submitted work. Other relationships: All authors have declared that there are no other relationships or activities that could appear to have influenced the submitted work.

Figures

Figure 1
Figure 1. PRISMA Flowchart Showing the Study Selection Process
PRISMA: Preferred Reporting Items for Systematic Reviews and Meta-Analyses

Similar articles

References

    1. Understanding healthcare cybersecurity risk management complexity. Burrell DN. Land Forces Acad Rev. 2024;29:38–49.
    1. Zero-trust architecture for cloud-based AI chat applications: encryption, access control, and continuous AI-driven verification. Mubeen M. https://urn.fi/URN:NBN:fi:amk-2024121937601 Theseus. 2024
    1. Towards secure and trusted AI in healthcare: a systematic review of emerging innovations and ethical challenges. Khan MM, Shah N, Shaikh N, Thabet A, Alrabayah T, Belkhair S. Int J Med Inform. 2025;195:105780. - PubMed
    1. The significance of artificial intelligence in zero trust technologies: a comprehensive review. Ajish D. J Electr Syst Inf Technol. 2024;11:30.
    1. Blockchain-powered cyber-resilient microservices: AI-driven intrusion prevention with zero-trust policy enforcement. Kaul D. J Math Comput Sci. 2019:1–34.

LinkOut - more resources