Glossary / Security

Zero Trust Architecture

A cybersecurity framework based on the principle of "never trust, always verify"—requiring strict identity verification for every person and device attempting to access resources, regardless of their location inside or outside the network perimeter.

Why it matters

Traditional perimeter-based security ("castle and moat") assumes everything inside the network is trusted. With remote work, cloud computing, and sophisticated attacks, this model is obsolete. Zero Trust assumes attackers are already inside and protects every resource individually.

The Core Principles of Zero Trust

Zero Trust Architecture (ZTA) is not a product you can buy—it's a strategic approach to security that eliminates implicit trust. The framework is built on five fundamental principles:

1. Never Trust, Always Verify

Every access request must be fully authenticated, authorized, and encrypted before granting access. This applies whether the user is the CEO or a contractor, whether they're in the office or on public Wi-Fi. Authentication factors typically include:

2. Assume Breach

Design your security architecture as if attackers have already compromised your network. This mindset drives practices like:

3. Least Privilege Access

Users and applications receive the minimum permissions necessary to perform their tasks—nothing more. This is enforced through:

4. Microsegmentation

The network is divided into small, isolated zones. Each zone has its own security controls. If an attacker compromises one segment, they cannot easily move to others. This is fundamentally different from traditional flat networks where a single breach grants access to everything.

5. Continuous Monitoring & Validation

Trust is not a one-time verification. Sessions are continuously evaluated for risk signals. Credentials can be challenged mid-session if behavior changes or risk increases. This includes:

NIST 800-207: The Zero Trust Standard

The National Institute of Standards and Technology (NIST) published Special Publication 800-207 as the definitive guide for Zero Trust Architecture. Key components defined by NIST include:

NIST Zero Trust Architecture Components

  • Policy Engine (PE): The brain that decides whether to grant access based on enterprise policy
  • Policy Administrator (PA): Executes access decisions by instructing the Policy Enforcement Point
  • Policy Enforcement Point (PEP): The gate that allows, monitors, or terminates connections
  • Identity Provider: Creates, manages, and validates user/device identities
  • SIEM System: Collects and analyzes security events for threat detection
"Zero trust is not a single architecture but a set of guiding principles for workflow, system design, and operations."
— NIST SP 800-207

Zero Trust Network Access (ZTNA)

ZTNA is the technology that enables Zero Trust for remote access. Unlike traditional VPNs that grant broad network access once connected, ZTNA:

ZTNA vs. Traditional VPN

Aspect Traditional VPN ZTNA
Access Model Network-wide access Per-application access
Trust Model Trust after authentication Continuous verification
Visibility Exposed VPN endpoint Invisible to attackers
Lateral Movement Possible once inside Prevented by design

Implementing Zero Trust: A Practical Roadmap

Transitioning to Zero Trust is a journey, not a single project. Organizations typically follow this phased approach:

  1. Phase 1 - Identity Foundation: Deploy strong identity management (MFA, SSO, directory integration). You cannot verify what you cannot identify.
  2. Phase 2 - Device Trust: Implement device posture assessment. Ensure endpoints meet security baselines before granting access.
  3. Phase 3 - Network Segmentation: Begin microsegmentation, starting with crown jewel assets and working outward.
  4. Phase 4 - Application Layer: Move to application-aware access policies. Implement ZTNA for remote access.
  5. Phase 5 - Data Protection: Classify data and apply protection policies. Encryption, DLP, and access logging.
  6. Phase 6 - Continuous Improvement: Implement analytics, automate response, and continuously refine policies based on telemetry.

Zero Trust for Defense & Government

For defense organizations and government agencies, Zero Trust is increasingly mandated. In the United States, Executive Order 14028 requires federal agencies to adopt Zero Trust principles. Key considerations include:

Common Misconceptions About Zero Trust

Alterra's Approach to Zero Trust

At Alterra Solutions, we design software that operates in Zero Trust environments. Our defense and enterprise applications are built with:

Whether you're implementing Zero Trust for enterprise or classified networks, we can help you navigate the architecture decisions.

Related Terms