Zero Trust Architecture
Zero Trust is a security model based on the principle "never trust, always verify." It assumes that threats exist both outside and inside the network, and every access request must be authenticated, authorized, and encrypted.
The End of Perimeter Security
Core Principles
1. Verify Explicitly
Always authenticate and authorize based on all available data points: identity, location, device health, service, data classification, anomalies.
2. Use Least Privilege Access
Limit user access with just-in-time (JIT) and just-enough-access (JEA). Risk-based adaptive policies that respond to context.
3. Assume Breach
Minimize blast radius with segmentation. Verify end-to-end encryption. Use analytics to detect threats and improve defenses.
Zero Trust Pillars
Identities
- • Strong authentication (MFA)
- • Passwordless when possible
- • Conditional access policies
- • Identity governance
Devices
- • Device inventory
- • Compliance checking
- • Endpoint detection
- • Mobile device management
Applications
- • Shadow IT discovery
- • In-app permissions
- • Runtime monitoring
- • API security
Data
- • Data classification
- • Encryption everywhere
- • DLP policies
- • Access tracking
Infrastructure
- • JIT VM access
- • Micro-segmentation
- • Threat detection
- • Config management
Networks
- • Network segmentation
- • Encrypt all traffic
- • Real-time threat protection
- • No implicit trust zones
Zero Trust Network Access (ZTNA)
ZTNA replaces VPNs with identity-aware, context-aware access to specific applications rather than entire network segments.
❌ Traditional VPN
- • Full network access after auth
- • Implicit trust of VPN users
- • Lateral movement possible
- • Performance bottlenecks
- • Binary access model
✓ ZTNA
- • App-specific access only
- • Continuous verification
- • No lateral movement
- • Cloud-native scaling
- • Granular policies
Policy Engine Architecture
+---------------+ +----------------------+ +---------------+
| Subject |----->| Policy Engine |----->| Resource |
| (User/App) | | | | (Data/App) |
+---------------+ | +----------------+ | +---------------+
| | Policy | |
Signals --------->| | Decision | |
| | Point (PDP) | |
* Identity | +----------------+ |
* Device health | | |
* Location | v |
* Behavior | +----------------+ |
* Data sensitivity | | Policy | |
| | Enforcement | |
| | Point (PEP) | |
| +----------------+ |
+----------------------+
Implementation Steps
Identify Protected Surfaces
Map critical data, applications, assets, and services (DAAS).
Map Transaction Flows
Understand how users and apps access protected surfaces.
Architect Zero Trust Network
Deploy micro-perimeters around each protected surface.
Create Zero Trust Policies
Define who/what/when/where/why/how for access (Kipling Method).
Monitor and Maintain
Continuous logging, analytics, and policy refinement.
Zero Trust Tools & Platforms
Identity Providers
Okta, Azure AD, Google Workspace, Ping Identity
ZTNA Solutions
Zscaler, Cloudflare Access, Palo Alto Prisma, Akamai EAA
Micro-Segmentation
Illumio, VMware NSX, Guardicore, Cisco Tetration
Policy Engines
Open Policy Agent (OPA), AWS Cedar, Styra DAS