Zero Trust Security Model
Learn how to shrink the attack surface and implement a zero trust security model.
Zero Trust Access For Dummies Vol 3 2025 THREAT LANDSCAPE REPORTZero Trust is a security framework. It works on the principle that no user, device, or application should be inherently trusted. It requires strict identity verification and authorization for every access request, regardless of location, enforcing security policies based on the principle of least privilege. This modern approach continuously validates security configurations and postures to ensure robust protection from rapidly evolving threats.
Traditional security architecture is sometimes referred to as the “castle-and-moat” model. Think of the network as a castle and authorized users "cross the moat" to get inside the network perimeter. Even though this approach was useful to defend against external threats, it failed to address threats that already existed within the network. This traditional perimeter-based security approach only distrusts factors outside the existing network. Once a threat is able to cross the moat and get inside the network, it has free reign to wreak havoc within the castle that is your system. A zero trust network security model is based on identity authentication instead of trusting users based on their position relative to your network.
The term “zero trust” was first coined by John Kindervag at Forrester Research. In a paper published in 2010, Kindervag explained how traditional network security models fail to provide adequate protection because they all require an element of trust. Administrators have to trust people and devices at various points in the network, and if this trust is violated, the entire network could be put at risk.
To solve the problem, he recommended the use of segmentation gateways (SG), which could be installed in the heart of a network. The SG model involves incorporating several different protection measures and using a packet-forwarding engine to dispatch protections where they are needed in the network.
Zero trust implementation involves requiring strict identity verification for every individual or device that attempts to access the network or application. This verification applies whether or not the device or user is already within the network perimeter. User or device identity verification can be triggered by events such as changes in the devices being used, location, log-in frequency, or the number of failed login attempts.
Protection begins by identifying your protect surface, which is based on data, applications, assets, or services, commonly referenced by the acronym DAAS:
Establishing this protect surface helps you hone in on exactly what needs to be protected. This approach is preferable to trying to guard the attack surface, which constantly increases in size and complexity.
A zero trust policy involves regulating traffic around critical data and components by forming microperimeters. At the edge of a microperimeter, a zero trust network employs a segmentation gateway, which monitors the entry of people and data. It applies security measures that are designed to thoroughly vet users and data before to granting access using a Layer 7 firewall and the Kipling method.
A Layer 7 rule involves inspecting the payload of packets to see if they match known types of traffic. If a packet contains data that doesn’t meet the parameters of the Layer 7 rule, access is blocked. The Kipling method challenges the validity of the entry attempt by asking six questions about the entry and who is trying to get in: Who? What? When? Where? Why? How? If the answer to any of the queries raises a flag, access isn’t granted.
Multi-factor authentication (MFA) verifies the identity of a user by requiring them to provide multiple credentials. With traditional password entry methods, a bad actor only has to figure out a username and password, which often are easy for hackers to acquire. With MFA, users must provide multiple methods of identification. For example, a user may need both a USB stick and a password. Without either factor, the person would not be able to gain access.
Multi-factor authentication aids a zero-trust network by increasing the number of user-specific credentials required for access. Using MFA can increase the difficulty for hackers by a factor of two, three, four, or more.
Endpoints need to be verified to make sure each one is being controlled by the right person. Endpoint verification strengthens a zero trust approach because it requires both the user and the endpoint itself to present credentials to the network. Each endpoint has its own layer of authentication that would necessitate users to prove their credentials before gaining access.
Then, in order for a component or program on the network to allow the endpoint access, it sends a verification out to the endpoint. The user then responds on the device. The data sent from the endpoint is used to check its validity, and a successful receipt and transmission process earns the device the status of “trustworthy.”
Unified endpoint management (UEM) allows administrators to centralize how they manage IT infrastructures by giving them a single set of tools they can use to verify multiple endpoints. Endpoint detection and response (EDR) verifies the safety and security of the endpoint. EDR works like a multifaceted antivirus. It scans the endpoint, identifies threats, and then takes steps to protect the endpoint and by extension, the rest of the network.
Microsegmentation involves creating zones within the network to isolate and secure elements of the network that could contain sensitive information or provide access to malicious actors. A zero trust security approach benefits from microsegmentation because once the secured area has been microsegmented, it’s protected from threats. The firewall or filter that forms a barrier around the zone can also block threats from exiting the zone, which protects the rest of the network.
Least-privilege access refers to allowing users and devices to access only those resources that are essential to performing their duties. A zero trust setup benefits from least-privilege access because it limits the number of points of entry to sensitive data or infrastructure. Least-privilege access may also save time and resources because fewer MFA measures have to be employed, which limits the volume of identification credentials that have to be granted and managed.
Zero trust network access (ZTNA) is an element of zero trust access that focuses on controlling access to applications. ZTNA extends the principles of ZTA to verify users and devices before every application session to confirm that they meet the organizations policy to access that application. ZTNA supports multi-factor authentication to retain the highest levels of verification.
A key element of the ZTNA concept is the location independence of the user. The application access policy and verification process is the same whether the user is on the network or off the network. Users on the network have no more trust than users that are off the network.
For users off the network, ZTNA includes a secure, encrypted tunnel for connectivity from the user device to the ZTNA application proxy point. The automatic nature of this tunnel makes it easier to use than traditional VPN tunnels. The improved experience for users is leading many organizations to shift to ZTNA to replace VPN access.
The ZTNA application proxy point provides a benefit beyond just the transparent, secure remote access. By putting applications behind a proxy point, ZTNA hides those applications from the Internet. Only those users who have verified can gain access to those applications.
The Zero Trust model is built on several core principles that guide its implementation and ensure robust security:
Continuous Verification: Never trust, always verify. This means that every user, device, and application must be verified every time they access the network, regardless of their previous access or location.
Least Privilege Access: Users and devices should only have access to the resources they need to perform their specific tasks. This limits the potential damage from compromised credentials or insider threats.
Microsegmentation: Dividing the network into smaller, isolated zones helps contain security breaches and prevents lateral movement by attackers.
Multi-Factor Authentication (MFA): Requiring multiple authentication factors (e.g., password, security token, biometric verification) makes it significantly harder for unauthorized users to gain access.
Increased Visibility: Comprehensive monitoring and logging of network activity provide valuable insights into potential threats and help security teams respond quickly to incidents.
Unified Endpoint Management: Centralized management of endpoints (devices) ensures consistent security policies and simplifies the process of verifying and securing devices.
Endpoint Detection and Response (EDR): Real-time threat detection and response capabilities on endpoints help identify and neutralize malicious activity before it can spread.
By adhering to these principles, organizations can create a more secure environment that is resilient to modern cyberattacks.
Many enterprises have adopted the zero trust philosophy when designing their security architecture for several reasons:
Without zero trust architecture in place, companies unnecessarily expose themselves to costly data breaches. For example, in May 2014, hackers gained access to the addresses, names, dates of birth, and passwords of 145 million eBay users. To get in, they simply used the login credentials of three eBay employees.
If eBay had used a zero trust model equipped with at least two levels of MFA, the hackers would have needed more information than just a username and password to gain access. Requiring a USB device to be plugged into a specific computer, for example, could have saved eBay the embarrassment and loss of public trust.
With the right tools, implementing a zero trust approach to security only takes a few basic steps.
Outline the types of data or network components you absolutely need to protect. For many companies, this may include:
Determine what resources each user needs to access to perform their duties, and make sure they can only access those specific areas. Limiting the attack surface for phishing or malware invasions this way, reduces human error. And if a user only has one weak password that is used for several points of access, a malicious actor could figure out that password and inflate the effects of a breach. The hacker could infiltrate areas essential to the user’s job but also the nonessential sections of the network as well.
When your IT team has visibility, they can help users get the most out of the network and keep a watchful eye on the system. Visibility tools may include:
Start with a clear strategy: Define your security goals and identify your critical assets and data.
Implement strong identity and access management (IAM): Establish robust authentication and authorization mechanisms, including MFA, to verify users and devices before granting access. Consider using hardware-based security keys for stronger MFA.
Embrace microsegmentation: Divide your network into smaller, isolated zones to limit the impact of security breaches.
Monitor and analyze network traffic: Continuously monitor network activity for suspicious behavior and use analytics to identify potential threats. Keep devices updated and patched to minimize vulnerabilities.
Employ endpoint security solutions: Deploy endpoint detection and response (EDR) and other endpoint security tools to protect devices from malware and other threats.
Enforce least privilege access: Grant users and devices only the minimum necessary permissions to access resources. Regularly review and revoke unnecessary access rights. Apply the principle of least privilege for everyone in the organization.
Automate security tasks: Automate security processes such as user provisioning, access control, and threat detection to improve efficiency and reduce human error.
Stay informed about emerging threats: Keep abreast of the latest security threats and vulnerabilities to proactively update your Zero Trust policies and defenses. Incorporate threat intelligence feeds to identify and mitigate emerging threats.
Prioritize user experience: Avoid overly restrictive security measures that may incentivize users to circumvent security protocols.
The zero-trust network model is highly adaptable and can be used to enhance security in a wide range of situations and across various industries:
Securing Remote Access: In the remote work environment, zero trust is essential for verifying and securing access for employees working from anywhere. By ensuring that only authorized users and devices can access specific applications and resources, organizations significantly reduce the risk of security breaches.
Protecting Sensitive Data: Zero trust helps protect sensitive data, such as customer information, financial records, and intellectual property, by implementing strict access controls and continuous monitoring. This is particularly important in industries with stringent compliance requirements, such as healthcare and finance.
Preventing Insider Threats: By limiting user access to only the resources they need to perform their job duties, zero trust helps mitigate the risk of insider threats, whether intentional or accidental. Continuous verification and monitoring also help detect and prevent malicious activities by internal actors.
Securing Cloud Environments: As organizations increasingly migrate their applications and data to the cloud, zero trust provides a robust security framework for protecting these assets. By enforcing strict access controls and continuous verification, organizations ensure that their cloud environments are secure.
Securing IoT Devices: The proliferation of Internet of Things (IoT) devices presents new security challenges. Zero trust helps secure these devices by authenticating them and limiting their access to the network.
By implementing zero trust, organizations create a more secure environment that protects against a wide range of threats and supports their business objectives.
Fortinet helps organizations to secure and connect their work-from-anywhere employees and devices to critical applications and resources. Fortinet Universal ZTNA is a robust security solution that offers businesses flexibility, granular access control, and ongoing verification. It enables policies to be enforced for users regardless of location. With granular access control, access is granted to specific applications only for that session, providing better security. With the client-initiated model, the IT team has more visibility and control of the endpoint while providing users with a faster, easier experience. Universal ZTNA requires no additional licenses and is a free feature in FortiOS and FortiClient, allowing customers to shift from VPN to ZTNA at their own pace. With Fortinet’s added flexibility, you don’t need to choose exclusively between VPN or ZTNA; you can adapt to the solution that’s right for you.
Because of continual movement between on-premises, home network, and public network environments, zero trust, endpoint, and network security must be connected through a centralized security and management framework. Solutions unified by a common set of APIs and integration points ensure users can seamlessly shift from one location to another, enjoying a consistent user experience that is appropriately protected with contextual security. Fortinet is the only vendor capable of delivering this unified approach, enabling proactive, integrated, and context-aware security that automatically adapts to where users are, what device they are using, and what resources they are accessing.
Using a broad portfolio of zero trust, endpoint, and network security solutions within the Fortinet Security Fabric, Fortinet can deliver security, services, and threat intelligence that can automatically follow users across distributed networks. The Security Fabric can also adjust enforcement to the perceived risk of every interaction—whether on the road, at home, or in the office to enable consistent enterprise-grade protection and enhance productivity end-to-end.
Want a seamless and secure way to access applications from anywhere? Discover how ZTNA enhances remote security.
Zero trust is a network security philosophy that states no one inside or outside the network should be trusted unless their identification has been thoroughly checked.
Zero trust implementation involves requiring strict identity verification for every individual or device that attempts to access the network or application. This verification applies whether or not the device or user is already within the network perimeter.
Many enterprises have adopted the zero trust philosophy when designing their security architecture for several reasons: