Concepts

Zero Trust

Security model that doesn't implicitly trust any user or system, verifying every request regardless of its origin inside or outside the network.

seed#zero-trust#security#identity#network#authentication#authorization

What it is

Zero Trust is a security model based on "never trust, always verify." Unlike the traditional perimeter model (trust everything inside the network), Zero Trust verifies every request regardless of its origin.

Principles

  • Verify explicitly: authenticate and authorize every request
  • Least privilege: give only necessary permissions
  • Assume breach: design as if the attacker is already inside

Pillars

  • Identity: strong authentication (MFA, passwordless)
  • Devices: verify device state and compliance
  • Network: microsegmentation, don't trust internal network
  • Applications: identity-based access, not network-based
  • Data: classification and protection of sensitive data

Implementation

  • Identity-aware proxies (BeyondCorp, Cloudflare Access)
  • Service mesh with mTLS
  • Context-based access policies
  • Exhaustive logging and monitoring

Perimeter model vs zero trust

AspectTraditional perimeterZero Trust
TrustImplicit inside the networkNone — always verify
AccessVPN + firewallIdentity-aware proxy
SegmentationVLANs, subnetsPer-service microsegmentation
AuthenticationOnce (entering the network)Every request
Lateral movementEasy once insideBlocked by default
Remote workRequires VPNNative — location is irrelevant

Adoption steps

  1. Identity inventory: map users, services, and devices
  2. MFA everywhere: multi-factor authentication as a requirement, not an option
  3. Microsegmentation: isolate services with service mesh and mTLS
  4. Contextual access policies: evaluate identity + device + location + time
  5. Continuous monitoring: detect anomalies in access patterns

Why it matters

The perimeter security model assumes everything inside the network is trustworthy. Zero trust eliminates that assumption: every request is authenticated and authorized regardless of its origin. It is the security model that reflects the reality of distributed systems and remote work.

References

Concepts