Most security content about Zero Trust stays at the philosophy level. Never trust, always verify – yes, we know. But when you're responsible for actually building and securing infrastructure, you need to know what that means in practice. What are the components? How do they connect? What does a real Zero Trust architecture look like underneath the marketing language?
That's what this article is about.
The foundational concept in Zero Trust Architecture (ZTA) comes from NIST SP 800-207, and it starts with a clean separation between two planes:
The Control Plane manages decisions. It's where policy is defined, evaluated, and enforced. Nothing in your environment should get access without passing through the control plane first.
The Data Plane carries traffic. This is where the actual communication between users, devices, applications, and data happens. The data plane executes the decisions made by the control plane.
The critical implication: the control plane must be able to intercept and evaluate every access request before it reaches the data plane. If traffic can flow without touching the control plane, you have a gap in your Zero Trust architecture.
The PDP is the brain of a Zero Trust architecture. It evaluates access requests against defined policy and makes a binary decision: allow or deny.
The PDP receives a rich set of inputs:
The PDP evaluates these signals against policy rules and issues an access decision. That decision is then handed to the Policy Enforcement Point.
The PEP sits between the requestor and the resource, enforcing whatever decision the PDP issued. Think of it as the gatekeeper that can only act on instructions from the policy engine.
PEPs can take multiple forms: a network proxy, an API gateway, an application-layer agent, an identity-aware load balancer. The physical form factor matters less than the function – every path to a protected resource must pass through a PEP.
An important property of a correctly designed Zero Trust architecture: the PEP doesn't make trust decisions on its own. It enforces them. The separation of decision (PDP) from enforcement (PEP) is architecturally significant – it means you can update policy logic centrally without touching every enforcement point.
The PAP is where policies are created and managed. Security teams define rules here: who can access what, under what conditions, and with what constraints. The PAP feeds configured policy into the PDP.
Good PAP implementations provide policy-as-code capabilities, version control, audit logging of policy changes, and simulation tools that let you test policy changes before deploying them.
Identity is the primary control variable in Zero Trust. Where legacy security asked "is this traffic coming from inside the network?" Zero Trust asks "who is making this request, and can that identity be verified?"
A mature identity fabric has several components:
Identity Provider (IdP): The authoritative source of user identity. Modern enterprise environments typically consolidate on a cloud IdP (Entra ID, Okta, Google Workspace) that manages the full identity lifecycle – provisioning, authentication, deprovisioning.
Directory Services: The underlying data store for identity attributes – group memberships, roles, department, manager, location. These attributes inform access decisions beyond simple authentication.
Multi-Factor Authentication (MFA): The minimum bar for any Zero Trust implementation. Passwords alone are insufficient. MFA should be enforced universally, with no exceptions for "convenience" use cases.
Continuous Authentication: Beyond the initial login event, behavioral signals should continuously validate that the entity accessing a resource is still the legitimate user. Anomalies – unusual access patterns, geographic impossibilities, bulk data access – should trigger step-up authentication or session termination.
Non-Human Identities: Often overlooked. Service accounts, API keys, deployment pipelines, and AI agents all have identities that must be managed with the same rigor as human users. This category is growing fast and is covered in more depth in the dedicated article on Zero Trust and AI.
Identity governance is the process layer on top of the identity fabric. It answers questions like: who approved this account? Does this role still make sense? When was this access last reviewed?
Effective IGA includes:
In Zero Trust, identity isn't just about the user – it's about the user-device combination. A legitimate user on a compromised device is still a threat.
Device trust evaluation typically involves:
Device Registration: The device must be known to the organization. This usually means enrollment in a Mobile Device Management (MDM) or Unified Endpoint Management (UEM) platform.
Compliance Check: At access time, the device's current state is evaluated against policy. Is the OS patched? Is endpoint protection running and up to date? Is full-disk encryption enabled? Is the device jailbroken or rooted?
Certificate-Based Device Authentication: Rather than relying on device serial numbers alone, mature implementations issue certificates to managed devices. Certificate validity is continuously checked; compromised or decommissioned devices can have their certificates revoked immediately.
Risk Scoring: Some platforms continuously score device risk based on behavioral signals – unusual processes running, connections to suspicious domains, anomalous network behavior. This score feeds into the PDP's access decisions.
The practical implication: a valid user with valid credentials on an unmanaged or non-compliant device may be denied access, redirected to a limited-capability environment, or required to complete additional verification steps.
Traditional network security divided the network into a trusted inside and untrusted outside. Microsegmentation takes this much further – dividing the network into small, isolated zones where communication between segments requires explicit authorization.
The goal is lateral movement prevention. Even if an attacker compromises one workload, microsegmentation prevents them from freely moving through the environment to reach more valuable targets.
Approaches to Microsegmentation:
Network-based segmentation: Using VLANs, SDN, or network virtualization to enforce isolation at the network layer. Relatively coarse-grained but widely compatible.
Host-based segmentation: Firewall rules and agents enforced at the individual workload level. More granular and follows workloads as they move across infrastructure.
Application-layer segmentation: Service mesh technologies (like Istio or Linkerd) that enforce mTLS between services and implement policy at the application layer. Particularly relevant for microservices architectures.
The implementation hierarchy looks like this:
The appropriate level of granularity depends on your risk profile, the sensitivity of the environment, and operational complexity tolerance.
ZTNA is the successor to VPN for application access. Where VPN grants broad network access, ZTNA grants access to specific applications based on identity and device posture – without exposing the network layer at all.
The architecture typically involves:
The user never gets direct network access to the application's host. They connect to the broker, which authenticates them, validates their device, checks policy, and – if access is authorized – proxies the connection through the connector.
This approach eliminates several attack classes: users can't probe unexposed ports, can't perform lateral movement through the VPN tunnel, and can't access applications they aren't explicitly authorized for.
A Zero Trust architecture without comprehensive visibility is like flying blind. You may have all the right controls in place, but if you're not collecting and analyzing signals, you can't detect anomalies, investigate incidents, or improve your posture over time.
Critical data sources:
What you do with that data:
SIEM (Security Information and Event Management): Aggregate, correlate, and analyze security events. Modern SIEM platforms apply rules and ML models to detect anomalies that individual data sources can't surface.
UEBA (User and Entity Behavior Analytics): Build behavioral baselines for users and devices, then detect statistically significant deviations. Unusual login times, access to atypical resources, large data exports – UEBA surfaces these patterns.
SOAR (Security Orchestration, Automation, and Response): Automate repetitive response actions – blocking an IP, disabling an account, isolating a device – that would otherwise require manual intervention.
The combination of these capabilities enables something critical: detection of compromised accounts whose credentials are technically valid. Zero Trust verification catches known risks; behavioral analytics catches the unknown ones.
Putting it together, a complete Zero Trust architecture intercepts every access request through a PEP, routes the access decision to a PDP that evaluates identity, device, context, and policy, and logs everything to a visibility layer that feeds analytics.
For a user trying to access an internal application, the flow looks like this:
The same flow applies to service-to-service communication, just with service identity (certificates, workload identity) replacing user identity.
Treating identity as a solved problem: Standing up an IdP and enabling MFA is the start, not the finish. Identity governance, non-human identity management, and continuous authentication are frequently incomplete.
Ignoring east-west traffic: Most Zero Trust investments focus on north-south traffic (users accessing applications). East-west traffic (service-to-service, workload-to-workload) is often left uncontrolled, which is exactly where lateral movement happens.
Bolting monitoring on at the end: Visibility isn't a phase you complete after the access controls are in place. Build logging and analytics in from the beginning; you'll need the data during implementation to tune policies.
Creating too many exceptions: The "we'll fix this later" exceptions that get carved out under operational pressure have a way of becoming permanent. Each exception is a hole in the architecture. Track them explicitly and close them on a schedule.
Letting vendor lock-in drive architecture: Many vendors sell "complete Zero Trust platforms" that work perfectly within their ecosystem and imperfectly with everything else. Architect around standards (SAML, OIDC, mTLS, FIDO2) and treat vendors as implementation details.
Zero Trust Architecture is genuinely complex to implement well. There are real design decisions, real trade-offs, and real operational challenges. The organizations that succeed treat it as a strategic initiative – not a product purchase – and take an iterative approach over months and years.
The components described here aren't novel individually. What Zero Trust does is connect them into a coherent architectural model where trust decisions are explicit, evidence-based, continuously evaluated, and centrally auditable.
That's a fundamentally better approach to security than the alternative – and the architecture exists today to implement it.
Deepak Gupta is the Co-founder & CEO of GrackerAI and an AI & Cybersecurity expert with 15+ years in digital identity and enterprise security. He writes about cybersecurity, AI, and B2B SaaS at guptadeepak.com.
*** This is a Security Bloggers Network syndicated blog from Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from Code to Scale authored by Deepak Gupta - Tech Entrepreneur, Cybersecurity Author. Read the original post at: https://guptadeepak.com/zero-trust-architecture-the-technical-blueprint/