Home/ CSE/ Zero Trust Architecture (ZTA)
CSE · Seminar 03 · Never trust, always verify

Zero Trust Architecture (ZTA)

Zero Trust removes implicit network trust: every request is authenticated, authorised and continuously evaluated against policy, regardless of where it originates.

ZTANIST 800-207identitymicro-segmentationBeyondCorp

The traditional perimeter model assumed that anything inside the corporate network was trustworthy. Cloud, remote work and lateral-movement attacks broke that assumption. Zero Trust Architecture, formalised in NIST SP 800-207, treats the network as always hostile and grants access per-request based on identity, device posture and context — never on location alone.

Working principle

Access decisions flow through a logical Policy Decision Point (PDP) and Policy Enforcement Point (PEP). When a subject requests a resource, the PEP intercepts it and asks the PDP, which combines the request with signals — identity, MFA, device health, threat intelligence — to issue a short-lived, least-privilege grant that is re-evaluated continuously.

requestevaluatecontextallow/denyleast-privSubject (user/device)Policy Enforcement PtPolicy Decision PointSignals: MFA, device, riskProtected resourceNIST SP 800-207 logical components
Figure 1. Every access flows through enforcement. The decision point fuses identity and real-time signals before granting a short-lived, scoped session.
Table 1. Perimeter security vs. Zero Trust
DimensionPerimeter / castle-moatZero Trust
Trust basisNetwork locationIdentity + device + context
Default stanceTrust inside, block outsideDeny by default everywhere
SegmentationCoarse VLANsMicro-segmentation per workload
SessionLong-livedShort-lived, continuously verified
Lateral movementEasy once insideContained by per-resource policy

Core pillars

  • Identity — strong authentication, MFA, single sign-on
  • Device — posture and compliance checks before access
  • Micro-segmentation — isolate workloads to limit blast radius
  • Continuous monitoring — re-authorise on changing risk
Common pitfallZero Trust is an architecture and operating model, not a single product. Vendors sell components (ZTNA, identity, SASE) but the policy engine and data inventory must be designed for the organisation.

References & further reading

  1. NIST SP 800-207, “Zero Trust Architecture,” 2020.
  2. Ward & Beyer, “BeyondCorp: A New Approach to Enterprise Security,” Google, 2014.
  3. CISA Zero Trust Maturity Model v2.0, 2023.