Cloud computing and big data analytics have transformed enterprise operations, yet traditional perimeter-based security models fail in distributed, multi-cloud environments. Zero Trust Architecture (ZTA) addresses these limitations by enforcing continuous verification and identity-centric controls. This study examines Zero Trust principles applied to cloud-based big data systems, focusing on micro-segmentation, policy-as-code enforcement, and continuous authentication mechanisms.