Lab 04: Zero Trust Design

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Apply NIST SP 800-207 Zero Trust Architecture principles

  • Design PEP/PDP/PA components

  • Implement micro-segmentation strategy

  • Build a Zero Trust policy engine simulator


Step 1: NIST SP 800-207 Zero Trust Principles

Core tenets:

  1. Verify explicitly — always authenticate and authorise based on all available data points

  2. Use least-privilege access — limit user access with JIT and JEA

  3. Assume breach — minimise blast radius, segment access, verify end-to-end encryption

NIST SP 800-207 Pillars:

Pillar
Description
Technologies

Identity

Strong identity as the control plane

MFA, OIDC, SAML, PAM

Device

Device health as access prerequisite

MDM, EDR, device certificates

Network

Micro-segmentation; no implicit trust

SDN, firewall, encrypted tunnels

Workload

Secure applications and APIs

WAF, API gateway, service mesh

Data

Classify and protect data

DLP, encryption, CASB

Visibility

Continuous monitoring and analytics

SIEM, UEBA, telemetry


Step 2: PEP/PDP/PA Architecture

Signal inputs to PDP:

  • Identity provider (IdP) — verified user identity, MFA status

  • Device compliance — MDM status, EDR health score, patch level

  • Threat intelligence — user risk score (UEBA), IP reputation

  • Request context — time of day, geolocation, resource sensitivity


Step 3: BeyondCorp Model (Google's ZTA)

BeyondCorp principles (translated to enterprise):

  1. Networks are not trusted; all access via encrypted channels

  2. Device inventory and device trust assessed continuously

  3. Access based on user + device; not network location

  4. All access to services is authenticated and authorised

Implementation layers:


Step 4: Zero Trust Policy Engine Simulator

📸 Verified Output:


Step 5: Micro-Segmentation Design

Traditional perimeter vs. ZTA segmentation:

Segmentation strategies:

  • VLAN-based: Traditional, coarse-grained

  • SDN/Overlay: VXLAN, VMware NSX, Cisco ACI — fine-grained

  • Identity-based: Illumio, Guardicore — workload identity microsegmentation

  • Service mesh: Istio/Linkerd — east-west traffic in Kubernetes

💡 Start with crown-jewel segmentation: Isolate your most sensitive assets (PCI zone, HR data, IP repositories) first. Complete micro-segmentation is a multi-year journey.


Step 6: Identity-Centric Access (OIDC/SAML)

OIDC flow for ZTA:

Device trust scoring:


Step 7: ZTA Implementation Roadmap

Phase 1 (0-6 months) — Foundation:

  • Deploy MFA for all users (FIDO2/WebAuthn preferred)

  • Inventory all devices; enrol in MDM

  • Implement IdP (Okta, Azure AD, Ping Identity)

  • Enable conditional access policies

Phase 2 (6-18 months) — Segmentation:

  • Deploy identity-aware proxy (PEP) for critical apps

  • Implement SDN micro-segmentation for crown jewels

  • Enable EDR on all endpoints

  • Deploy PAM for privileged accounts

Phase 3 (18-36 months) — Maturity:

  • UEBA for continuous risk scoring

  • CASB for cloud app visibility

  • Service mesh for Kubernetes east-west

  • Automate PDP with ML-based risk decisions


Step 8: Capstone — ZTA for Remote Workforce

Scenario: 3,000 remote employees; replace legacy VPN with ZTA


Summary

Concept
Key Points

NIST SP 800-207

Never trust, always verify; explicit trust per request

PEP

Enforces access decisions (proxy, gateway, switch)

PDP

Makes access decisions based on policy + signals

PA

Manages and distributes policies to PEPs

Micro-segmentation

Isolate workloads; deny all unless explicitly permitted

Device Trust

Score-based: patch + EDR + MDM + certificate

BeyondCorp

Access from network perimeter → user + device identity

Last updated