You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Zero Trust is a security model based on the principle of "never trust, always verify." It assumes that threats exist both outside and inside the network, and no user, device, or connection should be implicitly trusted based on network location alone.
Traditional network security operates on a castle-and-moat model:
Traditional Model:
Outside (Untrusted) ──── [Firewall/Moat] ──── Inside (Trusted)
Problem: Once inside the moat, everything is trusted.
An attacker who bypasses the perimeter has
unrestricted access to internal resources.
This model fails because:
| Assumption | Reality |
|---|---|
| The perimeter stops all threats | Phishing, insider threats, and supply chain attacks bypass the perimeter |
| Internal traffic is safe | Lateral movement is the primary technique for post-exploitation |
| VPN = trusted | Compromised VPN credentials grant broad network access |
| On-premises = secure | Cloud, remote work, and SaaS extend the network beyond any perimeter |
| Principle | Description |
|---|---|
| Never trust, always verify | Every access request must be authenticated and authorised |
| Assume breach | Design as if the network is already compromised |
| Least privilege access | Grant only the minimum access required, only for the duration needed |
| Verify explicitly | Use all available data — identity, device health, location, behaviour |
| Microsegmentation | Isolate resources so that compromising one does not expose others |
| Continuous verification | Do not trust a single authentication event — re-verify throughout the session |
| Component | Role |
|---|---|
| Policy Engine (PE) | Evaluates access requests against policies using identity, device, and context |
| Policy Administrator (PA) | Executes the decision — grants or denies the connection |
| Policy Enforcement Point (PEP) | The gateway that enforces the PE/PA decision at the resource boundary |
| Identity Provider (IdP) | Authenticates users and issues identity tokens |
| Device Trust | Evaluates device health, compliance, and management status |
| Data Classification | Identifies the sensitivity of the resource being accessed |
| Threat Intelligence | Provides real-time risk signals (compromised credentials, known threats) |
User/Device
│
▼
[Policy Enforcement Point (PEP)]
│
│── Collects: identity, device posture, location, time, behaviour
│
▼
[Policy Engine (PE)]
│
│── Evaluates against policies
│── Checks: IdP, device trust, threat intelligence, data classification
│
▼
[Decision: Allow / Deny / Step-Up Auth]
│
▼
[Access to specific resource ONLY]
(No broad network access)
NIST SP 800-207 is the foundational standard for Zero Trust. It defines three approaches:
| Approach | Description |
|---|---|
| Identity-Centric | Access decisions based on user and device identity |
| Network-Centric | Microsegmentation and software-defined perimeters |
| Combined | Both identity and network controls working together (recommended) |
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.