Zero-Trust and AI-Powered Security Architecture for SAP-Centric Enterprise Platforms and Digital Banking Infrastructure

Main Article Content

Christian S. Jensen

Abstract

As enterprise platforms and digital banking infrastructures increasingly migrate to cloud-native and hybrid environments, security challenges have grown in complexity. Traditional perimeter-based security models are no longer sufficient to protect sensitive financial data, SAP-centric enterprise applications, and interconnected digital banking systems. Cyber threats such as account takeovers, insider attacks, ransomware, and fraud demand adaptive, proactive, and intelligent security architectures.

 


This research proposes a Zero-Trust and AI-powered security architecture for SAP-centric enterprise platforms and digital banking infrastructures. The framework integrates identity-centric security, continuous authentication, micro-segmentation, and adaptive access policies with AI-based anomaly detection, threat intelligence, and predictive risk analytics. By enforcing the principle of “never trust, always verify,” the architecture ensures that every access request—internal or external—is authenticated, authorized, and continuously validated. AI modules monitor system behavior, detect suspicious patterns, and respond to security events in real time, enhancing the resilience and integrity of enterprise operations.


 


The proposed solution supports secure integration of SAP modules, cloud services, and banking applications, while maintaining compliance with regulations such as GDPR, PCI DSS, and SOX. The study highlights advantages including proactive threat detection, real-time response, regulatory alignment, and reduced attack surfaces, while also addressing challenges such as implementation complexity, AI model management, and operational overhead in large-scale SAP and financial environments.

Article Details

Section

Articles

How to Cite

Zero-Trust and AI-Powered Security Architecture for SAP-Centric Enterprise Platforms and Digital Banking Infrastructure. (2025). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(5), 12911-12918. https://doi.org/10.15662/IJRPETM.2025.0805029

References

1. Kamadi, S. (2024). GenAI data engineering: Synthetic data and feature engineering framework for cloud analytics. World Journal of Advanced Research and Reviews, 24(1), 2867–2877. https://doi.org/10.30574/wjarr.2024.24.1.3165

2. Ganesan, G. B. K. (2025). Fraud Detection Systems in Enterprise Integration Architecture. IJSAT-International Journal on Science and Technology, 16(1).

3. Rajasekaran, M., Sekar, S., Manikandaprabhu, K., Vijayakumar, R., Rajmohan, M., & Murugan, S. (2024, October). Next-Gen Coaching: IoT and Linear Regression for Adaptive Training Load Management. In 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (pp. 224–229). IEEE.

4. Ravi Kumar Ireddy. (2024). Real-Time Payment Orchestration and Fraud Governance Framework: Cloud-Native Treasury Optimization with Ensemble Deep Learning Integration. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10(3), 1152–1161.

5. Nallamothu, T. K. (2024). Empowering Clinicians through AI-Augmented Documentation: Insights from Dragon Copilot Implementation. International Journal of Advanced Research in Computer Science & Technology, 7(6), 11309–11318.

6. C. Nagarajan & M. Madheswaran. (2011). Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques. Electric Power Components and Systems, 39(8), 780–793.

7. Kumar, R., Mohammed, A. S., & Murthy, C. J. (2023). Cash Management Forecasting Using Long Short-Term Memory (LSTM) Networks. American Journal of Cognitive Computing and AI Systems, 7, 123–155.

8. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.

9. Uttama Reddy Sanepalli. (2024). Operationalizing MLOps with Databricks Pipelines: Scalable Machine Learning in Cloud Environments. International Journal of Scientific Research in Science, Engineering and Technology, 10(6), 2544–2552.

10. Jagadeesh, S., & Soundappan, R. S. (2014). Survey on knowledge discovery in speech emotion detection. International Journal of Innovative Research in Computer and Communication Engineering, 2(5), 4476–4481.

11. Gowda, M. K. S. (2025). Comprehensive Audit Data Pipeline Architecture—Strategies for Modern Banking Audit, Compliance and Risk Management. International Journal of Advanced Research in Computer Science & Technology, 8(1), 11590–11597.

12. Panda, S. S. (2024). Delivering Scalable Cloud Services in China: Microsoft and 21Vianet Collaboration. International Journal of Advanced Research in Computer Science & Technology, 7(6), 11325–11333.

13. Parathraju, P., & Umasankar, P. (2025). Performance evaluation of ultrathin CdTe-based solar cells with dual absorbers via SCAPS-1D simulation. Scientific Reports, 15(1), 26428.

14. Archana, R., & Anand, L. (2025). Residual U-Net with self-attention based deep convolutional adaptive capsule network for liver cancer segmentation and classification. Biomedical Signal Processing and Control, 105, 107665.

15. Adari, V. K. (2024). Interoperability and Data Modernization: Building a Connected Banking Ecosystem. International Journal of Computer Engineering and Technology, 15(6), 653–662.

16. Ambati, K. C. (2025). Improving user experience and operational efficiency for smarter procurement management. International Journal of Engineering & Extended Technologies Research, 7(3), 1282–1289.

17. Vaidya, S., Shah, N., Shah, N., & Shankarmani, R. (2020). Real-time object detection for visually challenged people. In ICICCS (pp. 311–316). IEEE.

18. Karnam, A. (2024). Engineering Trust at Scale: How Proactive Governance and Operational Health Reviews Achieved Zero Service Credits for Mission-Critical SAP Customers. International Journal of Humanities and Information Technology, 6(4), 60–67.

19. Sampath Kumar Konda. (2024). Distributed AI Infrastructure Orchestration: A Hyperscale Multi-Cloud Framework for Geographic Load Balancing with Renewable Energy Optimization. International Journal of Scientific Research in Science Engineering and Technology, 11(4), 522–533.

20. Mulla, F. A. (2024). Building Scalable Mobile Applications: A Comprehensive Guide to Shared Component Architecture. International Journal of Computer Engineering and Technology, 15, 1337–1348.

21. Raju, S., & Sindhuja, D. (2024). Transparent encryption for external storage media with mobile-compatible key management by Crypto Ciphershield. PatternIQ Mining, 1(3), 12–24.

22. Yashwanth, K., Adithya, N., Sivaraman, R., Janakiraman, S., & Rengarajan, A. (2021). Design and Development of Pipelined Computational Unit for High-Speed Processors. In ICCCNT (pp. 1–5). IEEE.

23. Charumathi, M. V., & Inbavalli, M. Familiarizing the pine nut oil by fusing it into different food products.

24. C. Nagarajan & M. Madheswaran. (2011). Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis. Electrical Engineering, 93(3), 167–178.

25. Gopinathan, V. R. (2024). AI-Driven Customer Support Automation: A Hybrid Human–Machine Collaboration Model for Real-Time Service Delivery. International Journal of Technology, Management and Humanities, 10(1), 67–83.