International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJSAT
Upcoming Conference(s) ↓
Conferences Published ↓
ALSDAHW-2025
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 17 Issue 1
January-March 2026
Indexing Partners
Securing Enterprise APIs in Zero-Trust Architectures: Practical Implementations with Apigee and Cloud IAM
| Author(s) | Viplove Goswami |
|---|---|
| Country | United States |
| Abstract | The enterprise security landscape has undergone a tectonic shift as organizations transition from monolithic, perimeter-based defenses toward decentralized, cloud-native architectures. This transformation has placed Application Programming Interfaces (APIs) at the center of the modern digital ecosystem, serving as the primary conduits for data exchange and business logic. However, the exposure of these interfaces has concurrently expanded the attack surface, necessitating a security model that does not rely on network location as a proxy for trust. Zero-Trust Architecture (ZTA), as formalized in NIST Special Publication 800-207, provides a framework for this new reality by mandating continuous verification, least privilege access, and comprehensive monitoring. This paper explores the practical implementation of Zero-Trust principles for securing enterprise APIs using Google Cloud’s Apigee and Identity and Access Management (IAM). By analyzing the technical mechanisms of OAuth 2.0, Mutual TLS, Workload Identity Federation, and Machine Learning-based anomaly detection, this research details how organizations can build a resilient, identity-centric security posture. The analysis emphasizes the integration of the API management layer as a robust Policy Enforcement Point that operates in concert with cloud-native identity services to eliminate implicit trust and mitigate the risks of lateral movement and data exfiltration. |
| Keywords | Zero-Trust Architecture, API Security, Apigee, Google Cloud IAM, NIST SP 800-207, OAuth 2.0, Workload Identity Federation, Mutual TLS, Anomaly Detection, Cloud-Native Security. |
| Field | Engineering |
| Published In | Volume 17, Issue 1, January-March 2026 |
| Published On | 2026-02-06 |
| DOI | https://doi.org/10.71097/IJSAT.v17.i1.10425 |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.