![]() |
International Journal of Scientific Research and Engineering Development( International Peer Reviewed Open Access Journal ) ISSN [ Online ] : 2581 - 7175 |
IJSRED » Archives » Volume 8 -Issue 6

๐ Paper Information
| ๐ Paper Title | Integrating Zero Trust Security Model into Vendor Risk Management: Issues and Challenges |
| ๐ค Authors | Olukayode Sorunke |
| ๐ Published Issue | Volume 9 Issue 1 |
| ๐ Year of Publication | 2026 |
| ๐ Unique Identification Number | IJSRED-V9I1P80 |
| ๐ Search on Google | Click Here |
๐ Abstract
As organizations increasingly rely on third-party vendors for critical business operations, the traditional perimeterbased security approach has proven inadequate in mitigating evolving cyber threats. A breach of their third-party vendor could mean a breach of the entire enterprise. Hence, it is very imperative to ensure that the third-party vendor risks are properly identified and managed. A Zero Trust security Model has been identified as a strategic means of mitigating and managing third-party vendor risk. This paper explores the integration of a Zero Trust security model into Vendor Risk Management (VRM) to strengthen organizational cyber resilience. Zero Trust, which operates on the principle of โnever trust, always verify,โ mandates continuous authentication, strict access controls, and real-time monitoring, regardless of user location or device. This paper explores the integration of the Zero Trust architecture into Vendor Risk Management (VRM) frameworks, highlighting the benefits, implementation considerations, and the significant challenges organizations face in aligning the two paradigms. Key issues such as technological complexity, organizational resistance, scalability, and limited visibility into vendor environments are analyzed Through focused panel discussion, case examples, and implementation strategies, the paper highlights key challengesโsuch as legacy system compatibility, cultural resistance, and increased complexityโand offers solutions for a phased, scalable deployment. By embedding Zero Trust principles into VRM, organizations can better safeguard sensitive data, reduce attack surfaces, and enhance overall third-party security posture in an increasingly interconnected digital ecosystem. The paper concludes with strategic recommendations for a phased, risk-based adoption of Zero Trust principles in VRM to strengthen supply chain security and overall cyber resilience.
๐ How to Cite
Olukayode Sorunke,"Integrating Zero Trust Security Model into Vendor Risk Management: Issues and Challenges" International Journal of Scientific Research and Engineering Development, V9(1): Page(642-649) Jan-Feb 2026. ISSN: 2581-7175. www.ijsred.com. Published by Scientific and Academic Research Publishing.
๐ Other Details
