How Zero Trust Networking Works: Beyond the Perimeter Model

Zero Trust Networking is a security architecture that eliminates implicit trust from every layer of a network. The foundational principle is simple: never trust, always verify. Every access request -- whether it originates from inside the corporate network or from a coffee shop halfway around the world -- must be authenticated, authorized, and continuously validated before any resource is accessed. In a zero trust model, there is no "inside" and "outside" the network. There is only verified and unverified.

This is a radical departure from the perimeter-based security model that dominated enterprise networking for decades. Traditional networks drew a hard boundary: firewalls, VPNs, and DMZs separated the trusted internal network from the untrusted internet. Once you were "inside" -- connected to the corporate LAN or authenticated through the VPN -- you were implicitly trusted and could access most internal resources with minimal additional checks. Zero trust rejects this assumption entirely, because the perimeter model has been repeatedly proven inadequate: lateral movement after a breach, insider threats, compromised VPN credentials, and the dissolution of network boundaries through cloud computing and remote work have all exposed the fundamental flaw of trusting anything based on network location alone.

This article examines the architecture, standards, protocols, and real-world implementations of zero trust networking -- from Google's BeyondCorp to NIST SP 800-207, from policy engines to device posture checks, and from micro-segmentation to modern ZTNA products that are replacing traditional VPNs.

The Death of the Perimeter

To understand why zero trust exists, you need to understand what it replaced. The perimeter security model -- sometimes called the "castle and moat" approach -- worked like this: you built a fortified boundary around your network using firewalls, intrusion detection systems, and VPN gateways. Traffic from outside was inspected and filtered. Traffic inside was largely trusted. Users who connected through the VPN were treated as if they were physically sitting in the office.

This model had a critical assumption baked in: that network location equals trustworthiness. If your IP address was in the 10.0.0.0/8 range assigned to internal systems, you were trusted. If you came through the VPN and got a 172.16.x.x address from the VPN concentrator, you were trusted. The firewall rules might restrict which ports you could reach, but the fundamental question -- "should this entity be allowed to access this resource right now?" -- was answered primarily by where the request came from, not who was making it or whether the device was compromised.

Several forces destroyed this model:

The fundamental problem was that the perimeter was a binary gate: you were either inside (trusted) or outside (untrusted). There was no mechanism for continuous, granular, context-aware access decisions. Zero trust replaces this binary with a spectrum of continuous verification.

Google BeyondCorp: The Origin Story

The concept of zero trust networking was articulated by Forrester Research analyst John Kindervag in 2010, but the most influential real-world implementation came from Google. In 2011, in the wake of Operation Aurora -- a sophisticated state-sponsored attack attributed to China that compromised Google's internal systems through spear-phishing -- Google began building BeyondCorp, an internal initiative to eliminate the privileged corporate network entirely.

BeyondCorp's core insight was radical for its time: access to enterprise applications should not depend on whether you are on the corporate network. Instead, access should depend on the identity of the user, the security posture of the device, and the context of the request. A Google engineer working from home on a fully patched, company-managed Chromebook should have the same access as one sitting in the Mountain View campus. Conversely, a compromised device on the corporate LAN should be denied access.

Google published a series of papers (2014-2016) describing BeyondCorp's architecture:

BeyondCorp was groundbreaking because it proved that a company operating at Google's scale -- with over 100,000 employees and an enormous attack surface -- could operate without a privileged network. It demonstrated that identity-based access, combined with continuous device assessment, was not just theoretically superior to perimeter security but practically achievable.

NIST SP 800-207: The Zero Trust Standard

In August 2020, the National Institute of Standards and Technology (NIST) published Special Publication 800-207: Zero Trust Architecture, which codified zero trust principles into a vendor-neutral framework. Following Executive Order 14028 (May 2021), all U.S. federal agencies were directed to adopt zero trust architectures, making SP 800-207 the de facto standard.

NIST defines zero trust through seven tenets:

  1. All data sources and computing services are considered resources. Not just servers and databases, but SaaS applications, printers, IoT devices -- anything that can be accessed over a network.
  2. All communication is secured regardless of network location. Traffic on the internal LAN must be encrypted and authenticated just like traffic traversing the internet.
  3. Access to individual resources is granted on a per-session basis. Authentication to one resource does not grant access to others. Every session is independently authorized.
  4. Access is determined by dynamic policy. Policies consider user identity, device posture, behavioral attributes, and environmental conditions -- not just static ACLs.
  5. The enterprise monitors and measures the security posture of all owned and associated assets. No device is inherently trusted. Continuous monitoring feeds into access decisions.
  6. Authentication and authorization are strictly enforced before access is allowed. This is dynamic and continuous, not a one-time gate at login.
  7. The enterprise collects information about the current state of assets, network infrastructure, and communications, and uses it to improve security posture. Telemetry and analytics are first-class components, not afterthoughts.

The NIST model defines a logical architecture with two critical components: the Policy Decision Point (PDP) and the Policy Enforcement Point (PEP).

NIST SP 800-207 Zero Trust Architecture Subject User + Device Any network location PEP Policy Enforcement Point Resource App / Data / Service Enterprise-owned Policy Decision Point (PDP) Policy Engine Evaluates rules against context Policy Admin Issues session credentials Identity Provider IdP / SSO / MFA Device Inventory MDM / EDR / posture Threat Intel SIEM / logs / feeds Activity Logs Audit / compliance request allowed session query decision Data sources feed context into the PDP for every access decision Untrusted Zone (any network) Access granted per-session only

The Policy Enforcement Point sits inline between the subject and the resource. It intercepts every access request and consults the PDP before allowing or denying access. The PEP can be implemented as a reverse proxy, an API gateway, a network firewall, or an agent on the endpoint. The Policy Decision Point evaluates the request against policy rules, drawing on multiple data sources: identity provider, device inventory, threat intelligence, activity logs, and environmental context. The PDP returns an allow/deny/conditional decision to the PEP, which enforces it.

This separation is critical because it decouples policy definition from policy enforcement. You can change who has access to what by modifying policies in the PDP without touching the enforcement infrastructure. And you can deploy multiple PEPs (proxies, gateways, network controls) all driven by the same centralized policy engine.

Identity-Based Access: Beyond IP Addresses

The most fundamental shift in zero trust is moving from network-based access control to identity-based access control. In a perimeter model, the question is "what network is this request coming from?" In zero trust, the question is "who is making this request, from what device, and should they be allowed to access this specific resource right now?"

Identity in zero trust has multiple dimensions:

In concrete terms: instead of a firewall rule that says "allow 10.0.0.0/8 to access port 443 on the payroll server," a zero trust policy says "allow users in the HR group, authenticating with a FIDO2 key, from a managed device with an up-to-date EDR agent and full-disk encryption enabled, to access the payroll application, during business hours, from the expected geographic region." If any of those conditions changes -- the EDR agent reports a malware detection, the user's session becomes anomalous, the device falls out of compliance -- the access is revoked immediately, mid-session.

Micro-Segmentation

In a traditional flat network, once an attacker is inside, they can reach any system. Micro-segmentation addresses this by creating granular security zones around individual workloads, applications, or even processes. Instead of one large trusted zone, you have thousands of tiny zones, each with its own access policy.

There are three primary approaches to micro-segmentation:

The goal of micro-segmentation is to minimize the blast radius of a breach. If an attacker compromises a web server, they should not be able to reach the database server directly, even if both are on the same physical network. Every lateral movement requires passing through a policy enforcement point that evaluates identity and context.

Device Posture and Continuous Assessment

Zero trust does not just authenticate users -- it continuously assesses the security posture of their devices. A user with valid credentials on a compromised device is arguably more dangerous than an anonymous attacker, because they have legitimate access tokens that can be weaponized.

Device posture checks typically evaluate:

These checks are not one-time gates at login. In a mature zero trust implementation, device posture is continuously monitored. If a device's EDR agent stops responding, or a new CVE is published for the device's OS version and the patch is not applied within the grace period, the device's trust score degrades and access may be restricted or revoked -- even if the user has an active session.

This continuous assessment model is what distinguishes zero trust from traditional VPN-based access. A VPN authenticates you once, grants you network access, and largely forgets about you until the session expires. Zero trust never stops evaluating whether your access should continue.

ZTNA vs VPN: A Fundamental Architecture Shift

Zero Trust Network Access (ZTNA) is the category of products that implement zero trust principles as a replacement for traditional VPN remote access. While a VPN grants broad network-level access, ZTNA provides granular application-level access. The differences are architectural, not just incremental:

Property VPN ZTNA
Access scope Full network (L3/L4) Per-application (L7)
Trust model Trusted after auth Continuously verified
Visibility Network-level only Application-level (user, action, data)
Lateral movement Possible (flat network) Prevented (isolated sessions)
Resource discovery Resources visible on network Resources hidden until authorized
Device posture Optional, point-in-time Required, continuous
User experience All traffic tunneled (slow) Only app traffic proxied
Scalability VPN concentrator bottleneck Distributed edge enforcement

A critical property of ZTNA is that applications are dark to the internet. In a VPN model, the VPN gateway has a public IP address that anyone can scan and probe. The applications behind the VPN are visible on the internal network to anyone with VPN access. In ZTNA, the applications have no public-facing listener at all. The ZTNA connector establishes an outbound connection from the application's network to the ZTNA provider's edge. Users connect to the edge, authenticate, pass policy checks, and are then proxied to the application through the outbound tunnel. From the outside, there is nothing to scan -- the attack surface is dramatically reduced.

Software-Defined Perimeter (SDP)

The Software-Defined Perimeter (SDP), originally developed by the Defense Information Systems Agency (DISA) and later standardized by the Cloud Security Alliance, is a specific architecture for implementing zero trust access. SDP is sometimes used synonymously with ZTNA, though it refers to a particular implementation pattern.

SDP uses a "deny-all" default posture: network resources are invisible and unreachable until a client is authenticated and authorized. The architecture has three components:

Single Packet Authorization is a significant advancement over traditional port knocking. In SPA, the client sends a single UDP packet containing an HMAC-authenticated payload with the client's identity, a timestamp, and a nonce. The AH verifies the HMAC, checks the timestamp to prevent replay attacks, and -- only if valid -- opens a temporary firewall pinhole for the client's IP address. If the SPA packet is invalid, the AH does not respond at all. This makes it impossible for an attacker to distinguish a network that uses SPA from one that has no services running at all.

Continuous Authentication and Session Management

Traditional authentication is binary: you are either authenticated or you are not. You log in once, receive a session token, and that token is valid until it expires (often hours or days later). Zero trust replaces this with continuous authentication -- an ongoing assessment of whether the user and device should retain access.

Continuous authentication evaluates multiple signals throughout a session:

This is a significant departure from the VPN model, where once the tunnel is established, the user has unmonitored network access for the duration of the session. In zero trust, the system is always watching, always evaluating, always ready to revoke access if the risk calculus changes.

Implementation: Policy Engines and Enforcement

A zero trust architecture requires a policy engine that can make real-time access decisions based on multiple inputs. The policy engine is the brain of the system. It typically uses a combination of:

Open Policy Agent (OPA) has emerged as a popular open-source policy engine for zero trust implementations. OPA uses a declarative language called Rego that can express complex policy rules. For example, a Rego policy might state that access to the production database requires a managed device, a recent MFA challenge (within the last 30 minutes), membership in the DBA security group, and no active threat alerts on the device. OPA evaluates these policies in milliseconds, making it suitable for inline enforcement.

Real-World Implementations

Several products implement zero trust networking at scale, each with a different architectural approach:

Cloudflare Access

Cloudflare Access is a ZTNA product that leverages Cloudflare's global CDN edge network as the enforcement layer. When you protect an application with Cloudflare Access, users connect to the nearest Cloudflare edge node (Cloudflare operates in over 300 cities worldwide). The edge node authenticates the user against your identity provider (Okta, Azure AD, Google Workspace, etc.), evaluates device posture through the Cloudflare WARP client, and proxies the authorized request to your application through Cloudflare Tunnel (formerly Argo Tunnel). The application itself has no public IP address -- it establishes an outbound-only connection to Cloudflare's network. This means there is nothing for attackers to scan or DDoS at the application's network.

Zscaler Private Access (ZPA)

Zscaler's ZPA routes all access through Zscaler's cloud, where their broker evaluates policies before connecting users to applications. The architecture uses "App Connectors" deployed near applications that establish outbound-only connections to Zscaler's cloud. Users never connect directly to the application network. ZPA operates at the application layer, providing per-application micro-tunnels rather than network-level access. Zscaler's approach emphasizes the "never expose the network" principle: the application's network is entirely hidden from users and from the internet.

Tailscale (Partial Zero Trust)

Tailscale occupies an interesting middle ground. It provides identity-based access through its integration with identity providers and its ACL system. Every device in a Tailscale network (tailnet) is authenticated, and access is controlled by ACLs that reference user identities and group memberships rather than IP addresses. Tailscale's device authentication through a trusted IdP and its ACL-based access model align with zero trust principles.

However, Tailscale is not a full ZTNA solution in the traditional sense. It provides network-level (WireGuard tunnel) access rather than application-level access. It does not perform deep device posture checks (OS patch level, EDR status) or continuous session evaluation by default. It is better described as a zero trust overlay network: it replaces the VPN with an identity-aware, encrypted mesh, but the granularity of access control is at the network/port level rather than the application/API level. For many organizations, this is sufficient -- and the simplicity and performance of Tailscale's approach makes it far more practical than a full ZTNA deployment.

Google BeyondCorp Enterprise

Google commercialized its internal BeyondCorp as BeyondCorp Enterprise (now part of Chrome Enterprise Premium). It uses Chrome as the enforcement agent, evaluating device posture through signals available to the browser (certificate presence, OS version, screen lock status). Access is mediated through Identity-Aware Proxy (IAP), which authenticates users and enforces context-aware access policies for GCP-hosted applications and on-premises applications connected via Cloud Interconnect or VPN.

VPN vs ZTNA Architecture Traditional VPN User VPN Gateway Public IP exposed Flat Internal Network -- full access after auth App A App B Database Lateral movement possible Zero Trust (ZTNA) User ZTNA Edge Auth + policy check PDP IdP + posture Authorized app only Connector outbound only App B Database Hidden -- no public exposure No lateral movement

The Role of mTLS in Zero Trust

Mutual TLS is the cryptographic foundation of zero trust service-to-service communication. In standard TLS, only the server presents a certificate. In mTLS, both the client and server present certificates and verify each other's identity. This provides three properties essential to zero trust:

In a Kubernetes environment with a service mesh like Istio, mTLS is typically automated. The mesh's control plane (istiod) acts as a certificate authority, issuing short-lived SPIFFE-compliant certificates to each workload. The sidecar proxies (Envoy) handle the mTLS handshake transparently -- application code does not need to be modified. Certificates are rotated automatically, often every 24 hours, which limits the window of exposure if a certificate is compromised.

The combination of mTLS for transport security and OAuth 2.0 / JWT for application-level authorization is a common pattern in zero trust architectures. mTLS ensures you are talking to the right service; OAuth/JWT ensures the request is authorized at the application level.

Challenges and Limitations

Zero trust is not a product you buy -- it is an architecture you build incrementally. The path from perimeter security to full zero trust is long and fraught with practical challenges:

There is also the philosophical challenge: zero trust taken to its logical extreme means trusting nothing, which is both practically impossible and operationally paralyzing. Every implementation involves pragmatic compromises -- choosing where to draw the "trust but verify" line. The policy engine itself must be trusted. The identity provider must be trusted. The device attestation mechanism must be trusted. Zero trust is not zero trust at every layer; it is about minimizing implicit trust and making the remaining trust explicit, auditable, and revocable.

Zero Trust and Network Infrastructure

Zero trust does not replace the physical network -- it changes how the network is used. BGP still routes packets between autonomous systems. DNS still resolves names to addresses. The difference is that the network is treated as a hostile transport medium, not a trust boundary.

This has implications for network infrastructure:

You can use the god.ad BGP Looking Glass to investigate the network infrastructure behind zero trust providers. Look up the IP ranges used by Cloudflare Access, Zscaler's edge nodes, or your organization's ZTNA connectors to understand the AS path and routing topology. Verifying that your ZTNA provider's prefixes have valid RPKI ROA entries is a practical step toward ensuring that the very infrastructure your zero trust architecture depends on is protected against route hijacking.

Try looking up a ZTNA provider's IP range in the BGP Looking Glass to see how the identity-based security layer maps onto the internet's routing infrastructure -- because even in a zero trust world, the packets still travel through BGP.

See BGP routing data in real time

Open Looking Glass
More Articles
How TLS/HTTPS Works: Securing the Internet's Traffic
Certificate Transparency: How CT Logs Secure the Web's PKI
How Firewalls Work: Packet Filtering, Stateful Inspection, and Beyond
What is Cross-Site Scripting (XSS)?
What is Cross-Site Request Forgery (CSRF)?
What is Server-Side Request Forgery (SSRF)?