System Design Space
Knowledge graphSettings

Updated: February 21, 2026 at 11:59 PM

Zero Trust: a modern approach to architectural security

mid

A practical introduction to Zero Trust: principles, reference architecture, policy enforcement and phased implementation.

NIST

SP 800-207

Basic reference on Zero Trust Architecture from NIST.

Open document

Zero Trust is not a “new firewall” or one product, but a way to design security around identity, context and constant access verification. The main idea: the network itself is not a trust factor, so every request must be checked against the policy.

Zero Trust Principles

Never Trust, Always Verify

No request is considered secure by default: check identity, context and policy every time.

Least Privilege

Access rights should be minimal and short-lived, tied to a specific task.

Assume Breach

Design the system as if the attacker is already inside the perimeter: segmentation, observability and fast revoke.

Base

Identification -> AuthN -> AuthZ

Identity and authorization model is the foundation for Zero Trust rollout.

Open chapter

Reference architecture

Identity Plane

  • Workforce and workload identity (users, services, devices).
  • IdP + lifecycle management + MFA/passkeys.
  • Short-lived credentials instead of long-lived secrets.

Policy Plane

  • Policy decision point: RBAC/ABAC/ReBAC or policy-as-code.
  • Solution based on subject + action + resource + context.
  • Explicit deny-by-default as base mode.

Enforcement Plane

  • Policy enforcement points in gateway, mesh, applications.
  • mTLS and service identity for east-west traffic.
  • Full audit trail for access decisions.

Telemetry Plane

  • Continuous verification through logs, metrics and security signals.
  • Risk-based access and dynamic restrictions.
  • Fast incident response and automated revoke.

How to implement it step by step

1. Inventory

Collect a map of identities, services, secrets, critical paths and current trust assumptions.

2. Strong AuthN Baseline

Enable MFA/passkeys for users and workload identity for services; remove shared credentials.

3. Policy Centralization

Move access rules into a single policy layer and implement deny-by-default for new resources.

4. Segmentation + Enforcement

Separate the paths (prod/non-prod, data tiers, admin paths) and add PEP to key traffic points.

5. Continuous Validation

Set up monitoring of access anomalies, periodic review of rights and automatic rotation of credentials.

Antipatterns

  • Consider Zero Trust a product, not an architectural approach and operating model.
  • Limit yourself to VPN replacement only without revising the identity and authorization model.
  • Do 'allow all within the cluster' and call it zero trust.
  • Do not have revoke/deprovision processes - even with good authentication.
  • Leave admin access permanent, without JIT/JEA and explicit approvals flow.

A quick practical criterion: if after compromising one service the attacker gets “almost everything”, then Zero Trust is implemented only nominally.

Related chapters

Enable tracking in Settings

System Design Space

© 2026 Alexander Polomodov