Traditional network security relied on the castle-and-moat analogy: a hardened perimeter (firewalls, VPNs) protecting a trusted internal network. In modern cloud-native environments, this model is obsolete. Zero Trust Architecture (ZTA) operates on the premise that trust is a vulnerability. We must assume the network is already compromised.
The Three Pillars of Zero Trust
- Verify Explicitly: Never authenticate based on network location (IP address). Always authenticate and authorize based on all available data points: user identity, location, device health, service classification, and anomalies.
- Use Least Privilege Access: Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive polices, and data protection.
- Assume Breach: Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
Google BeyondCorp Model
BeyondCorp is Google's implementation of Zero Trust. It shifts access controls from the network perimeter to individual devices and users. Access to tools depends on the credentials of the user and the status of the device (is it managed? is the OS patched?).