Reconceptualizing Zero-Trust Security for Clinical Workstations: Integrating AI-Driven Architectures, Legacy Medical Devices, and Operating System Modernization in Healthcare Environments

Authors

  • Prof. Altheon R. Kryss Faculty of Computer Science, KU Leuven, Belgium

Keywords:

Zero Trust Architecture, Healthcare Cybersecurity, Clinical Workstations

Abstract

The accelerating digitization of healthcare infrastructures has intensified the exposure of clinical environments to sophisticated cyber threats, particularly as hospitals increasingly depend on interconnected clinical workstations, legacy medical devices, and heterogeneous operating systems. Traditional perimeter-based cybersecurity models have proven inadequate in addressing the complex risk landscape of modern healthcare systems, where implicit trust, static access controls, and outdated endpoint protections create systemic vulnerabilities. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity paradigm that challenges legacy assumptions by enforcing continuous verification, least-privilege access, and dynamic risk assessment. Within this evolving discourse, the adoption of modern operating systems, notably Windows 11, has been positioned as both a technical enabler and a governance challenge for implementing Zero Trust principles in hospital clinical workstations. This article develops a comprehensive, theory-driven, and empirically grounded examination of Zero Trust security in healthcare, with a particular focus on bridging AI-driven ZTA frameworks, legacy medical device constraints, and operating system modernization strategies.

Downloads

Download data is not yet available.

References

RocketMe Up Cybersecurity. (2024). Implementing Zero Trust Security Models in Clinical Environments — A Comprehensive Approach.

Kim, Y., et al. (2024). Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study. KSII Transactions on Internet and Information Systems.

Nayeem, M. (2026). Bridging zero-trust security and legacy medical devices: An evaluation of Windows 11 adoption in hospital clinical workstations. Frontiers in Emerging Artificial Intelligence and Machine Learning, 3(1), 1–8. https://doi.org/10.64917/feaiml/Volume03Issue01-01

Gambo, M. L., & Almulhem, A. (2025). Zero Trust Architecture: A Systematic Literature Review.

Sophia, E. (2025). AI-Driven Behavioral Biometrics For Continuous Authentication in Zero Trust.

Southwick, R. (2023). The Paradigm Shift: Healthcare Embraces a Zero Trust Approach to Cybersecurity.

Edo, O. C. (2023). A zero trust architecture for health information systems. Health and Technology.

Mondal, B., Dukkipati, S. S. N. C., Rahman, M. T., & Taimun, M. T. Y. (2025). Using Machine Learning for Early Detection of Ransomware Threat Attacks in Enterprise Networks. Saudi Journal of Engineering and Technology.

Abdelmagid, A. M., & Diaz, R. (2025). Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems.

Filho, W. L. R. (2025). The Role of Zero Trust Architecture in Modern Cybersecurity: Integration with IAM and Emerging Technologies.

Uzougbo, O. I., & Augustine, A. O. (2025). A Review of Authentication and Authorization Mechanisms in Zero Trust Architecture.

Chokkanathan, K., et al. (2025). AI-Driven Zero Trust Architecture: Enhancing Cyber-Security Resilience. IEEE.

Adamson, K. M., & Qureshi, A. (2025). Zero Trust 2.0: Advances, Challenges, and Future Directions in ZTA.

Ogendi, E. G. (2025). Leveraging Advanced Cybersecurity Analytics to Reinforce Zero-Trust Architectures within Adaptive Security Frameworks.

Tiwo, O. J., et al. (2025). Improving Patient Data Privacy and Authentication Protocols against AI-Powered Phishing Attacks in Telemedicine. Asian Journal of Research in Computer Science.

Mattsson, U. (2022). Zero Trust Architecture. Controlling Privacy and the Use of Data Assets.

Tetrate. (2023). Zero Trust and NIST SP 800-207: What CISOs Need to Know.

Qudus, L. (2025). Advancing Cybersecurity: Strategies for Mitigating Threats in Evolving Digital and IoT Ecosystems.

Kindervag, J. (2010). Build security into your network's DNA: The zero trust network architecture. Forrester Research Inc.

Okunlola, O. A. (2025). Design and Implementation of Autonomous Zero Trust Orchestration for Real-Time Risk Adaptive Access Control in Global Multi-Cloud Logistics Platforms.

Downloads

Published

2026-01-21

How to Cite

Prof. Altheon R. Kryss. (2026). Reconceptualizing Zero-Trust Security for Clinical Workstations: Integrating AI-Driven Architectures, Legacy Medical Devices, and Operating System Modernization in Healthcare Environments. Journal of Management and Economics, 6(01), 20–27. Retrieved from https://eipublication.com/index.php/jme/article/view/3859