System Design Space
Knowledge graphSettings

Updated: March 24, 2026 at 3:10 PM

Zero Trust: a modern approach to architectural security

medium

A practical introduction to Zero Trust: principles, reference architecture, policy enforcement and phased implementation.

Zero Trust becomes useful only when it stops being a slogan and turns into a new trust model inside the system.

The chapter shows how explicit identity checks, policy enforcement, segmentation, and phased migration move security away from blind faith in the network and into verifiable architectural choices.

For design reviews, it is a practical way to discuss Zero Trust not as a future-state slide, but as a sequence of steps with UX friction, latency overhead, and operational cost attached.

Practical value of this chapter

Design in practice

Use guidance on zero-trust approach and trust verification at every system layer to define architectural security requirements before implementation starts.

Decision quality

Validate solutions through threat model, security invariants, and production control operability, not compliance checklists alone.

Interview articulation

Frame answers as threat -> control -> residual risk, linking business scenario to concrete protection mechanisms.

Trade-off framing

Make trade-offs explicit for zero-trust approach and trust verification at every system layer: UX friction, latency overhead, operational cost, and compliance constraints.

NIST

SP 800-207

Basic reference on Zero Trust Architecture from NIST.

Open document

Zero Trust is not a "new firewall" or a single product, but a way to design security around identity, context and continuous access verification. The key idea: network location is not a trust signal, so every request must be evaluated against policy.

Zero Trust principles

Never Trust, Always Verify

No request is considered secure by default: check identity, context and policy every time.

Least Privilege

Access rights should be minimal and short-lived, tied to a specific task.

Assume Breach

Design the system as if the attacker is already inside the perimeter: segmentation, observability and fast revoke.

Base

Identification -> AuthN -> AuthZ

Identity and authorization model is the foundation for Zero Trust rollout.

Open chapter

Reference architecture

Identity Plane

  • Workforce and workload identity (users, services, devices).
  • IdP + lifecycle management + MFA/passkeys.
  • Short-lived credentials instead of long-lived secrets.

Policy Plane

  • Policy decision point: RBAC/ABAC/ReBAC or policy-as-code.
  • Decision based on subject + action + resource + context.
  • Explicit deny-by-default as the baseline mode.

Enforcement Plane

  • Policy enforcement points in gateway, mesh and applications.
  • mTLS and service identity for east-west traffic.
  • Full audit trail for access decisions.

Telemetry Plane

  • Continuous verification via logs, metrics and security signals.
  • Risk-based access and dynamic restrictions.
  • Fast incident response and automated revoke.

Context signals for policy decisions

Identity assurance

Question: Who is requesting access and how strong is the authentication?

Implementation: MFA/passkeys, phishing-resistant login, device-bound credentials.

Device posture

Question: Does the device meet baseline security requirements?

Implementation: EDR/MDM status, patch level, disk encryption, root/jailbreak checks.

Workload identity

Question: How does a service prove identity in service-to-service calls?

Implementation: Workload certificates, SPIFFE/SPIRE approach, short-lived credentials.

Data sensitivity

Question: How critical is the resource and does it require JIT access?

Implementation: Data classification, purpose binding, read-only by default for risky paths.

Behavioral context

Question: Are there anomalies in geo, time, or request behavior patterns?

Implementation: Risk scoring, adaptive auth, step-up challenge and runtime throttling.

Policy enforcement matrix

SurfacePEPChecksAction on deny
Edge API (north-south)API Gateway + WAFAuthN/AuthZ, token claims, schema validation, rate limits.Block request, write audit log, and notify SOC.
Service-to-service (east-west)Service mesh / sidecarmTLS identity, service policy, namespace segmentation.Terminate connection and log policy decision with trace ID.
Data planeDB proxy / data access layerABAC/ReBAC, row/column policy, time-bounded credentials.Reject request and trigger high-risk access review.
Admin operationsPrivileged access gatewayJIT elevation, approvals chain, session recording.Do not issue elevation token and notify service owners.
CI/CD and deployPolicy-as-code + admission controlSigned artifacts, workload identity, environment policy.Stop deployment and open a security ticket automatically.

Operational Zero Trust metrics

MFA/passkey coverage for privileged users

Target: 100%

Without strong authentication, Zero Trust quickly degrades into a formal checkbox.

mTLS coverage for east-west traffic

Target: >= 95%

Shows whether inter-service traffic is actually protected, not only the edge.

JIT/JEA share for admin operations

Target: >= 90%

Reduces risk from permanent privileged access and lateral movement.

Mean revoke time for compromised identity

Target: < 15 minutes

The faster the revoke, the smaller the compromise window and blast radius.

Policy decision log coverage

Target: 100%

Without full audit trail, investigation and compliance evidence become unreliable.

Implementation roadmap

1. Inventory

Collect a map of identities, services, secrets, critical paths and current trust assumptions.

2. Strong AuthN Baseline

Enable MFA/passkeys for users and workload identity for services; remove shared credentials.

3. Policy Centralization

Move access rules into a single policy layer and implement deny-by-default for new resources.

4. Segmentation + Enforcement

Separate trust zones (prod/non-prod, data tiers, admin paths) and add PEP to key traffic points.

5. Continuous Validation

Set up monitoring of access anomalies, periodic review of rights and automatic credential rotation.

Antipatterns

  • Treat Zero Trust as a product, not as an architectural approach and operating model.
  • Do only VPN replacement without revisiting identity and authorization model.
  • Keep 'allow all inside cluster' and still call it zero trust.
  • Skip revoke/deprovision processes even with good authentication.
  • Keep permanent admin access without JIT/JEA and explicit approvals.

Quick practical check: if compromising one service still gives an attacker "almost everything", Zero Trust is only nominally implemented.

References

Related chapters

Enable tracking in Settings