Zerotrustnetworks Firstedition Preview
Zerotrustnetworks Firstedition Preview
1
• Network locality is not sufficient for deciding trust in a network.
• Every device, user, and network flow is authenticated and authorized.
• Policies must be dynamic and calculated from as many sources of data as
possible.
Traditional network security architecture breaks different networks (or pieces of a
single network) into zones, contained by one or more firewalls. Each zone is granted
some level of trust, which determines the network resources it is permitted to reach.
This model provides very strong defense-in-depth. For example, resources deemed
more risky, such as web servers that face the public internet, are placed in an exclu‐
sion zone (often termed a “DMZ”), where traffic can be tightly monitored and con‐
trolled. Such an approach gives rise to an architecture that is similar to some you
might have seen before, such as the one shown in Figure 1-1.
The zero trust model turns this diagram inside out. Placing stopgaps in the network
is a solid step forward from the designs of yesteryear, but it is significantly lacking in
the modern cyberattack landscape. There are many disadvantages:
Figure 1-3. A map of the early internet created by Jon Postel, dated February 1982