Lab 04: Zero Trust Design
Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash
Objectives
Apply NIST SP 800-207 Zero Trust Architecture principles
Design PEP/PDP/PA components
Implement micro-segmentation strategy
Build a Zero Trust policy engine simulator
Step 1: NIST SP 800-207 Zero Trust Principles
Core tenets:
Verify explicitly — always authenticate and authorise based on all available data points
Use least-privilege access — limit user access with JIT and JEA
Assume breach — minimise blast radius, segment access, verify end-to-end encryption
NIST SP 800-207 Pillars:
Identity
Strong identity as the control plane
MFA, OIDC, SAML, PAM
Device
Device health as access prerequisite
MDM, EDR, device certificates
Network
Micro-segmentation; no implicit trust
SDN, firewall, encrypted tunnels
Workload
Secure applications and APIs
WAF, API gateway, service mesh
Data
Classify and protect data
DLP, encryption, CASB
Visibility
Continuous monitoring and analytics
SIEM, UEBA, telemetry
Step 2: PEP/PDP/PA Architecture
Signal inputs to PDP:
Identity provider (IdP) — verified user identity, MFA status
Device compliance — MDM status, EDR health score, patch level
Threat intelligence — user risk score (UEBA), IP reputation
Request context — time of day, geolocation, resource sensitivity
Step 3: BeyondCorp Model (Google's ZTA)
BeyondCorp principles (translated to enterprise):
Networks are not trusted; all access via encrypted channels
Device inventory and device trust assessed continuously
Access based on user + device; not network location
All access to services is authenticated and authorised
Implementation layers:
Step 4: Zero Trust Policy Engine Simulator
📸 Verified Output:
Step 5: Micro-Segmentation Design
Traditional perimeter vs. ZTA segmentation:
Segmentation strategies:
VLAN-based: Traditional, coarse-grained
SDN/Overlay: VXLAN, VMware NSX, Cisco ACI — fine-grained
Identity-based: Illumio, Guardicore — workload identity microsegmentation
Service mesh: Istio/Linkerd — east-west traffic in Kubernetes
💡 Start with crown-jewel segmentation: Isolate your most sensitive assets (PCI zone, HR data, IP repositories) first. Complete micro-segmentation is a multi-year journey.
Step 6: Identity-Centric Access (OIDC/SAML)
OIDC flow for ZTA:
Device trust scoring:
Step 7: ZTA Implementation Roadmap
Phase 1 (0-6 months) — Foundation:
Deploy MFA for all users (FIDO2/WebAuthn preferred)
Inventory all devices; enrol in MDM
Implement IdP (Okta, Azure AD, Ping Identity)
Enable conditional access policies
Phase 2 (6-18 months) — Segmentation:
Deploy identity-aware proxy (PEP) for critical apps
Implement SDN micro-segmentation for crown jewels
Enable EDR on all endpoints
Deploy PAM for privileged accounts
Phase 3 (18-36 months) — Maturity:
UEBA for continuous risk scoring
CASB for cloud app visibility
Service mesh for Kubernetes east-west
Automate PDP with ML-based risk decisions
Step 8: Capstone — ZTA for Remote Workforce
Scenario: 3,000 remote employees; replace legacy VPN with ZTA
Summary
NIST SP 800-207
Never trust, always verify; explicit trust per request
PEP
Enforces access decisions (proxy, gateway, switch)
PDP
Makes access decisions based on policy + signals
PA
Manages and distributes policies to PEPs
Micro-segmentation
Isolate workloads; deny all unless explicitly permitted
Device Trust
Score-based: patch + EDR + MDM + certificate
BeyondCorp
Access from network perimeter → user + device identity
Last updated
