Advanced Security #zero-trust #ZTNA #BeyondCorp #micro-segmentation

Zero Trust Design Language

5 exercises — master zero trust design vocabulary: the "never trust, always verify" principle, micro-segmentation and lateral movement prevention, ZTNA vs VPN access model comparison, BeyondCorp reference architecture components, and policy engine continuous evaluation dimensions.

0 / 5 completed
Zero trust quick reference
  • "Never trust, always verify" — network location is not a trust signal; every request requires explicit identity + device + context verification regardless of source.
  • Three tenets (NIST SP 800-207) — (1) Verify explicitly, (2) Use least privilege, (3) Assume breach.
  • Micro-segmentation — fine-grained east-west traffic policy; each workload is its own segment; lateral movement requires explicit policy permit.
  • ZTNA vs VPN — VPN grants network-level access; ZTNA grants application-level access. ZTNA is continuously re-evaluated; VPN is verified only at connection time.
  • BeyondCorp — Google's reference ZT model: Device Inventory + Access Proxy + Access Control Engine. Users connect to the proxy, never to the network directly.
  • Policy engine inputs — Subject (identity/role) + Device (health/posture) + Environment (location/time/risk) + Resource (sensitivity/tier). Evaluated on every request.
  • Continuous evaluation — policy re-applied per request; mid-session revocation or step-up if context risk changes.
1 / 5

A security architect explains the company's new strategy: "We're moving away from a perimeter-based model. From now on, our core principle is 'never trust, always verify' — regardless of whether the request originates inside or outside our network."

What does this zero trust principle mean in practice?