The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions
| dc.citation.issue | 4 | |
| dc.citation.volume | 5 | |
| dc.contributor.author | Xu D | |
| dc.contributor.author | Gondal I | |
| dc.contributor.author | Yi X | |
| dc.contributor.author | Susnjak T | |
| dc.contributor.author | Watters P | |
| dc.contributor.author | McIntosh TR | |
| dc.date.accessioned | 2026-01-05T20:33:49Z | |
| dc.date.issued | 2025-12-01 | |
| dc.description.abstract | Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024) and found that 98% provided only partial or no real-world validation, leaving several core controls largely untested. Our critique, therefore, proceeds on two axes: first, mainstream ZTA research is empirically under-powered and operationally unproven; second, generative-AI attacks exploit these very weaknesses, accelerating policy bypass and detection failure. To expose this compounding risk, we contribute the Cyber Fraud Kill Chain (CFKC), a seven-stage attacker model (target identification, preparation, engagement, deception, execution, monetization, and cover-up) that maps specific generative techniques to NIST SP 800-207 components they erode. The CFKC highlights how synthetic identities, context manipulation and adversarial telemetry drive up false-negative rates, extend dwell time, and sidestep audit trails, thereby undermining the Zero-Trust principles of verify explicitly and assume breach. Existing guidance offers no systematic countermeasures for AI-scaled attacks, and that compliance regimes struggle to audit content that AI can mutate on demand. Finally, we outline research directions for adaptive, evidence-driven ZTA, and we argue that incremental extensions of current ZTA that are insufficient; only a generative-AI-aware redesign will sustain defensive parity in the coming threat cycle. | |
| dc.description.confidential | false | |
| dc.edition.edition | December 2025 | |
| dc.identifier.citation | Xu D, Gondal I, Yi X, Susnjak T, Watters P, McIntosh TR. (2025). The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions. Journal of Cybersecurity and Privacy. 5. 4. | |
| dc.identifier.doi | 10.3390/jcp5040087 | |
| dc.identifier.eissn | 2624-800X | |
| dc.identifier.elements-type | journal-article | |
| dc.identifier.number | 87 | |
| dc.identifier.uri | https://mro.massey.ac.nz/handle/10179/73973 | |
| dc.language | English | |
| dc.publisher | MDPI (Basel, Switzerland) | |
| dc.publisher.uri | https://www.mdpi.com/2624-800X/5/4/87 | |
| dc.relation.isPartOf | Journal of Cybersecurity and Privacy | |
| dc.rights | CC BY | |
| dc.rights | (c) 2025 The Author/s | |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
| dc.subject | zero trust | |
| dc.subject | generative AI | |
| dc.subject | cybersecurity | |
| dc.subject | adversarial attacks | |
| dc.subject | trust mechanisms | |
| dc.subject | AI auditing | |
| dc.title | The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions | |
| dc.type | Journal article | |
| pubs.elements-id | 608944 | |
| pubs.organisational-group | Other |

