🏰 Zero Trust Architecture
Never trust, always verify — micro-segmentation, continuous authentication, least privilege enforcement, and zero trust network access (ZTNA).
Zero Trust Architecture (ZTA) is a security model that eliminates implicit trust from the network. Instead of assuming everything inside the perimeter is safe, ZTA treats every access request as potentially hostile. Defined by NIST SP 800-207, it requires continuous verification of identity, device health, and context before granting access — regardless of network location. The three pillars: verify explicitly, use least privilege access, and assume breach.
Core Principles
Assume Breach
Minimize blast radius with micro-segmentation. Verify end-to-end encryption. Use analytics for threat detection, visibility, and automated response.
Continuous Evaluation
Session trust is re-evaluated continuously — behavioral analytics, device posture checks, and risk scoring during the entire session, not just at login.
Least Privilege Access
Limit access with just-in-time (JIT) and just-enough-access (JEA). Use risk-based adaptive policies and data protection to secure both data and productivity.
Micro-Segmentation
Software-defined granular network segmentation at the workload level. Controls east-west traffic between applications and services.
Verify Explicitly
Always authenticate and authorize based on all available data points — identity, location, device health, service, data classification, and anomalies.
🔐 Zero Trust Access Management
Why it matters: Traditional access control trusts users once authenticated. Zero Trust Access Management continuously verifies every user and device — always. A proactive stance against credential theft, session hijacking, and lateral movement. Core capabilities: Continuous identity verification (not just at login but throughout the session), device posture assessment (is the device compliant, patched, encrypted, MDM-enrolled?), context-aware access policies (location, time, network, risk score, behavior), adaptive MFA (step-up authentication based on risk — e.g., accessing sensitive data from new location triggers additional verification), just-in-time (JIT) access (temporary privilege elevation, auto-revoke after time window), and session risk scoring (real-time behavioral analytics during active sessions). Key Tools: Zscaler Private Access (ZPA) for app-level ZTNA, Okta Identity Cloud (adaptive MFA, lifecycle management), Microsoft Entra ID with Conditional Access (device compliance + risk-based policies), CrowdStrike Falcon Identity (identity threat detection and lateral movement prevention), Cisco Duo (device trust + MFA), BeyondTrust/CyberArk (privileged access management with JIT). CISO Impact: Eliminates implicit trust from the network, reduces attack surface by 70%+, and enables secure access from any location without VPN.
ZTNA (Zero Trust Network Access)
Replaces VPN with identity-aware application proxies. Users authenticate to specific applications, not the network. Hides infrastructure from the internet.
Zero Trust Architecture Model
NIST SP 800-207 Zero Trust Architecture
Policy decision point evaluates identity, context, and risk before granting resource-specific access
🔺 ZTA 7-Layer Defense Pyramid
Zero Trust is not a single technology — it's a layered defense strategy. Each layer adds security controls that work together to eliminate implicit trust.
Defense-in-Depth Pyramid
Data at the top is the crown jewel — each layer below adds protection. Zero Trust means no layer trusts another implicitly.
☁️ Zero Trust AWS Architecture — Secure Multi-Tier Design
A production-grade AWS architecture implementing Zero Trust principles across all layers — from edge security to data isolation. ISO 27001 aligned.
Private Subnets (10.0.1.0/24, 10.0.2.0/24): App Tier, DB, VPC Endpoints
NAT Gateway for outbound • VPC Endpoints → S3, KMS, ECR, SSM • Private connectivity only
| Security Service | Purpose | Compliance |
|---|---|---|
| GuardDuty | AI-powered threat detection across accounts | ISO 27001 |
| CloudTrail + Logs | API audit trail, VPC Flow Logs, Security Hub | ISO 27001 |
| Security Hub | Centralized security findings aggregation | ISO 27001 |
| IAM + SSO | MFA & JIT access for all human operators | ISO 27001 |
Interview Preparation
How do you implement Zero Trust Access Management at scale, and what tools would you use?
Zero Trust Access Management is implemented in 5 phases across identity, device, network, and application layers:
- Deploy a centralized IdP (Okta, Microsoft Entra ID, or Ping Identity) as the single source of truth
- Enforce MFA everywhere — no exceptions
- Move to passwordless authentication (FIDO2 security keys, Passkeys, Windows Hello) for high-privilege users
- Implement Conditional Access policies: block legacy auth protocols, require compliant devices, enforce location-based restrictions
- Enroll all corporate devices in MDM/UEM (Intune, Jamf, VMware Workspace ONE)
- Define device compliance policies: OS patch level, disk encryption enabled, EDR agent active, no jailbreak
- Non-compliant devices get restricted access (e.g., web-only email, no sensitive apps)
- Use CrowdStrike Zero Trust Assessment or Microsoft Compliance Score for real-time device risk scoring
- Build risk-based policies that evaluate: user identity + device posture + location + time + behavior + data sensitivity
- Step-up authentication for high-risk actions (e.g., accessing PII from new device triggers biometric + hardware token)
- Continuous session evaluation — revoke access if device posture degrades mid-session
- Implement JIT for all administrative access — CyberArk, BeyondTrust, or Azure PIM
- Zero standing privileges: admins request elevated access with business justification, auto-approved for low-risk or peer-approved for high-risk, with automatic revocation after time window (30-60 minutes)
- Replace VPN with ZTNA — Zscaler Private Access, Cloudflare Access, or Palo Alto Prisma Access
- Users connect to specific applications, not the network
- Applications are hidden from the internet
- METRICS TO REPORT: % of users on MFA (target 100%), % of apps behind ZTNA (target 100%), device compliance rate (target >95%), mean time to revoke access for terminated employees (target <1 hour), number of standing admin privileges (target: 0)
What is Zero Trust and how does it differ from traditional perimeter security?
Traditional perimeter security uses a 'castle and moat' approach — everything inside the network is trusted. Zero Trust eliminates this implicit trust: every request is verified regardless of source. Key differences:
1Identity-centric vs. network-centric,
2Micro-segmentation vs. flat internal network,
3Continuous verification vs. one-time authentication,
4Application-level access vs. network-level access,
5Assume breach vs. trust but verify. ZTA is defined in NIST SP 800-207.
How would you implement Zero Trust in an enterprise?
Phased approach: Phase
1Identify and map all assets, data flows, and users. Strong identity foundation (MFA, SSO). Phase
2Implement device trust and posture assessment (MDM/UEM). Phase
3Deploy ZTNA to replace VPN for application access. Phase
4Micro-segment the network. Phase
5Implement continuous monitoring and adaptive access policies. Start with high-value assets and crown jewels. Measure with metrics: percentage of apps behind ZTNA, MFA adoption, segment coverage.
Describe the 7-layer Zero Trust defense pyramid — what controls exist at each layer?
7 layers from bottom to top:
1Policies, Processes & Awareness (foundation) — security policies, code reviews, awareness programs.
2Physical — fences, walls, guards, locks, keys, badges.
3Perimeter — firewalls, IPS/IDS, DDoS protection, NGFW, UTM, web/email security gateways, DLP.
4Network — network access control, TLS, internal NGFW, internal proxies.
5Hosts/Devices — platform OS hardening, vulnerability management, anti-malware, MDM, EDR.
6Applications — identity management, federation, authentication, authorization auditing.
7Data (crown jewel) — information rights management, encryption, information protection. Zero Trust means no layer implicitly trusts another — each enforces its own verification.
Design a Zero Trust AWS architecture for a multi-tier web application — walk through each layer.
5 layers:
1Edge Security — CloudFront + WAF with OWASP managed rules, geo-blocking, TLS 1.3 termination. AWS Shield for DDoS protection.
2Network Layer — ALB behind Internet Gateway. Public subnet (10.0.0.0/
2
4allows only inbound 443, default deny all else. Private subnets (10.0.1.0/24, 10.0.2.0/
2
4for app tier and databases. NAT Gateway for outbound. VPC Endpoints for S3, KMS, ECR, SSM — no internet needed.
3Application Layer — Multi-AZ deployment (AZ-a, AZ-b) for high availability. Secrets via HashiCorp Vault or AWS KMS.
4Data Layer — NO internet access. RDS Primary with security group isolation, RDS Standby with Multi-AZ failover and KMS CMK encryption. ElastiCache Redis with TLS in-transit encryption.
5Security & Observability — GuardDuty for AI-powered threat detection, CloudTrail + VPC Flow Logs for audit trail, Security Hub for centralized findings, IAM with SSO + MFA + JIT access. ISO 27001 aligned throughout.
Compare ZTNA, SASE, SSE, and ZTE — how do these zero trust networking concepts relate?
4 concepts, layered:
1ZTNA (Zero Trust Network Access) — replaces VPN. Identity-aware, app-level access. Users connect to apps, not the network. Example: Zscaler Private Access (ZPA).
2SSE (Security Service Edge) — cloud-delivered security stack: SWG + CASB + ZTNA + DLP. No networking component. Secures remote users accessing cloud apps.
3SASE (Secure Access Service Edge) — SSE + SD-WAN. Complete cloud-delivered networking + security. Gartner-coined. Leaders: Zscaler, Palo Alto Prisma, Netskope.
4ZTE (Zero Trust Edge) — Gartner concept converging networking and security at the edge. Combines ZTNA, SD-WAN, SWG, CASB into cloud-delivered edge services. Aligns with SASE architecture. Relationship: ZTNA is a component of SSE, SSE is the security half of SASE, and ZTE is the architectural vision encompassing all of them.
How would you implement Zero Trust across a hybrid environment with both on-premises data centers and multi-cloud (AWS + Azure)?
Hybrid Zero Trust is the most challenging but most common real-world scenario. Architecture approach:
- Deploy a centralized IdP (Azure Entra ID or Okta) as the single source of truth for identity across on-prem AD, AWS IAM, and Azure RBAC
- Federate with SAML/OIDC
- Enforce MFA everywhere — no exceptions
- Use dedicated connections (AWS Direct Connect, Azure ExpressRoute) between on-prem and cloud — never route prod traffic over internet
- Deploy SD-WAN for branch offices with SASE integration (Zscaler, Palo Alto Prisma)
- On-prem — deploy Illumio or Guardicore for workload-level segmentation
- AWS — security groups + NACLs + PrivateLink
- Azure — NSGs + Private Endpoints + Azure Firewall
- Policy consistency via Terraform or Pulumi across all environments
- Deploy Zscaler Private Access or Cloudflare Access — users connect to specific apps, not networks
- Works identically whether the app is on-prem or in AWS/Azure
- No more split-tunnel VPN debates
- Classify data with sensitivity labels (Microsoft Purview, AWS Macie)
- Encrypt everywhere with CMKs
- Key management per cloud — AWS KMS, Azure Key Vault, on-prem HSM
- SIEM aggregation from all environments — Microsoft Sentinel or Splunk
- Feed CloudTrail (AWS), Activity Logs (Azure), and on-prem logs into one platform
- MDM/UEM (Intune, Jamf) for device posture assessment before granting access
- Non-compliant devices get limited access regardless of user identity
How do you measure Zero Trust maturity in an organization, and what metrics would you report to the CISO?
Zero Trust maturity is measured across 5 pillars (aligned with CISA Zero Trust Maturity Model):
- Metrics — % of users with MFA enabled (target: 100%), % of service accounts with automated credential rotation, number of overprivileged IAM roles (target: 0), mean time to revoke access for terminated employees (target: <1 hour)
- Levels: Traditional (passwords only) → Advanced (MFA + SSO) → Optimal (passwordless + continuous auth + behavioral analytics)
Metrics — % of devices enrolled in MDM/UEM, % with EDR agent active, % with current OS patches, number of unmanaged devices accessing corporate resources (target: 0).
Metrics — % of apps behind ZTNA (vs legacy VPN), number of flat network segments remaining, % of east-west traffic encrypted (mTLS), microsegmentation coverage.
Metrics — % of apps using modern auth (OIDC/SAML vs legacy NTLM), % with WAF protection, number of apps with exposed API endpoints without auth.
- Metrics — % of sensitive data classified and labeled, encryption coverage (at rest + in transit), DLP policy violations per month, number of data exfiltration attempts blocked
- REPORTING TO CISO: Monthly Zero Trust Scorecard with composite score (0-100)
- Track trend over quarters
- Benchmark against CISA ZT Maturity Model levels (Traditional → Initial → Advanced → Optimal)
- Map to risk reduction — e.g., 'Moving from VPN to ZTNA reduced our attack surface by 73% and eliminated lateral movement risk for 15,000 users.'
Framework Mapping
| Framework | Relevant Controls |
|---|---|
| NIST | SP 800-207 (Zero Trust Architecture), SP 800-53 AC-4 (Information Flow), SC-7 (Boundary Protection) |
| MITRE | T1078 (Valid Accounts), T1021 (Remote Services), T1563 (Remote Service Session Hijacking) |