Zero Trust Design Language
5 exercises — master zero trust design vocabulary: the "never trust, always verify" principle, micro-segmentation and lateral movement prevention, ZTNA vs VPN access model comparison, BeyondCorp reference architecture components, and policy engine continuous evaluation dimensions.
0 / 5 completed
Zero trust quick reference
- "Never trust, always verify" — network location is not a trust signal; every request requires explicit identity + device + context verification regardless of source.
- Three tenets (NIST SP 800-207) — (1) Verify explicitly, (2) Use least privilege, (3) Assume breach.
- Micro-segmentation — fine-grained east-west traffic policy; each workload is its own segment; lateral movement requires explicit policy permit.
- ZTNA vs VPN — VPN grants network-level access; ZTNA grants application-level access. ZTNA is continuously re-evaluated; VPN is verified only at connection time.
- BeyondCorp — Google's reference ZT model: Device Inventory + Access Proxy + Access Control Engine. Users connect to the proxy, never to the network directly.
- Policy engine inputs — Subject (identity/role) + Device (health/posture) + Environment (location/time/risk) + Resource (sensitivity/tier). Evaluated on every request.
- Continuous evaluation — policy re-applied per request; mid-session revocation or step-up if context risk changes.
1 / 5
A security architect explains the company's new strategy: "We're moving away from a perimeter-based model. From now on, our core principle is 'never trust, always verify' — regardless of whether the request originates inside or outside our network."
What does this zero trust principle mean in practice?
Zero trust reframes the security boundary from the network edge to the identity/device/context layer. The key insight: network location is not a security signal.
Traditional perimeter vs. zero trust:
Three NIST zero trust tenets (SP 800-207):
1. Verify explicitly — authenticate and authorise based on all available data: identity, location, device health, service or workload, data classification, anomalies
2. Use least privilege access — limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection
3. Assume breach — minimise blast radius, segment access, encrypt end-to-end, use analytics to get visibility, drive threat detection and improve defences
Key vocabulary:
• Zero trust — security model that eliminates implicit trust based on network location; requires explicit verification for every access request regardless of source
• "Never trust, always verify" — zero trust tagline; means every request is evaluated against policy using identity + device + context, not network address
• Assume breach — design principle that treats the network perimeter as already compromised; minimise lateral movement and blast radius
• Blast radius — the scope of damage an attacker can cause if a given credential, segment, or component is compromised
Traditional perimeter vs. zero trust:
| Dimension | Perimeter (castle-and-moat) | Zero Trust |
|---|---|---|
| Trust basis | Network location (inside firewall = trusted) | Identity + device posture + context-based policy |
| Lateral movement risk | High — once inside, attacker moves freely | Low — every resource requires re-verification |
| Remote work fit | Poor — requires VPN to "be inside" | Native — location-agnostic by design |
| Breach impact | High — attacker has broad internal access | Limited — blast radius contained by micro-segmentation and least privilege |
Three NIST zero trust tenets (SP 800-207):
1. Verify explicitly — authenticate and authorise based on all available data: identity, location, device health, service or workload, data classification, anomalies
2. Use least privilege access — limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection
3. Assume breach — minimise blast radius, segment access, encrypt end-to-end, use analytics to get visibility, drive threat detection and improve defences
Key vocabulary:
• Zero trust — security model that eliminates implicit trust based on network location; requires explicit verification for every access request regardless of source
• "Never trust, always verify" — zero trust tagline; means every request is evaluated against policy using identity + device + context, not network address
• Assume breach — design principle that treats the network perimeter as already compromised; minimise lateral movement and blast radius
• Blast radius — the scope of damage an attacker can cause if a given credential, segment, or component is compromised