Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Zero Trust - Modernes Sicherheitsarchitekturprinzip

Zero Trust is a security paradigm based on the principle of "never trust, always verify": No user, device, or network segment is implicitly trusted—every access request is explicitly verified.

Table of Contents (6 sections)

Zero Trust (literally: no trust) is a security architecture paradigm introduced in 2010 by John Kindervag at Forrester Research. The core idea is that the traditional model, in which everything within the corporate network is automatically trusted, is fundamentally flawed in a world of cloud services, remote work, and Advanced Persistent Threats (APT).

The principle is: "Never trust, always verify."

The Problem with the Traditional Perimeter Model

Classic network security works like a castle with a moat: heavily secured on the outside (firewall, IDS), but once inside, everyone trusts each other. This castle-and-moat model has three critical weaknesses:

  1. Insider Threats: Employees, contractors, or compromised accounts have largely free rein once they breach the perimeter
  2. Lateral Movement: Once an attacker gains initial access, they can move freely within the flat network
  3. Cloud and remote work have dissolved the perimeter: Data resides in AWS, users work from home, and SaaS applications run outside the corporate network

The Five Pillars of Zero Trust (according to NIST SP 800-207)

1. Identity

Identity is the new perimeter. Every access to resources requires strong authentication:

  • Multi-Factor Authentication (MFA) as a minimum requirement
  • Conditional Access: Access depends on device status, location, time, and risk level
  • Privileged Access Management (PAM): Administrative access is time-limited and logged
  • Identity Governance: Regular recertification of access rights

2. Devices

Only known, managed, and compliant devices are granted access:

  • Mobile Device Management (MDM) / Unified Endpoint Management (UEM)
  • Device compliance checks before access is granted (patch status, antivirus, disk encryption)
  • Certificate-based device authentication
  • Isolation of non-compliant devices in a quarantine VLAN

3. Network

Microsegmentation replaces the flat network:

  • Microsegmentation: Workloads and applications are divided into isolated segments. East-west traffic (internal) is filtered just as strictly as north-south traffic (external)
  • Software-Defined Perimeter (SDP): Resources are visible only to authorized users
  • Encryption of all connections: TLS 1.3 for all data transfers, including internal ones

4. Applications

Applications are no longer implicitly trusted simply because they reside on the intranet:

  • Application-based access control instead of network-based
  • API gateways for all application APIs with authentication and authorization
  • Zero-Trust Network Access (ZTNA) as a VPN replacement: Users receive direct, encrypted access only to the specific applications they need
  • Continuous Application Security Testing (SAST, DAST)

5. Data

Data-centric security:

  • Data classification: Who really needs which data?
  • Data Loss Prevention (DLP): Prevention of unauthorized data transfers
  • Encryption at rest and in transit for all sensitive data
  • Information Rights Management (IRM): Documents are protected even outside the organization

Zero Trust Implementation According to the CISA Maturity Model

The CISA Zero Trust Maturity Model (2023) describes three maturity levels:

Maturity LevelDescription
TraditionalStatic security controls, manual processes, minimal automation
AdvancedAttribute-based access control, integration of identity and network solutions, partially automated
OptimalDynamic policies, full automation, AI-powered anomaly detection

Common Mistakes in Zero Trust Implementation

"Buying Zero Trust as a Product"

Zero Trust is not a single technology, but a philosophy and architectural principle. No vendor can fully deliver "Zero Trust"—it requires a strategic transformation spanning months and years.

Too Broad a Scope from the Start

Recommended approach: Start with the highest-risk areas—typically privileged access and critical applications. Then expand gradually.

Lack of Change Management Support

Zero Trust fundamentally changes how employees work. Without training and communication, it leads to friction and workarounds (shadow IT).

Ignoring legacy systems

Not all systems are Zero Trust-ready. Legacy applications without API authentication or with hard-coded network connections require compensatory measures or replacement.

Zero Trust in practice: Technology building blocks

AreaTechnologies
Identity & AccessAzure AD / Entra ID, Okta, Ping Identity, CyberArk
EndpointMicrosoft Intune, VMware Workspace ONE, CrowdStrike
NetworkZscaler, Palo Alto Prisma, Cisco Umbrella
WorkloadAWS IAM, Kubernetes Network Policies, Service Mesh
DataMicrosoft Purview, Varonis, Forcepoint DLP
VisibilitySIEM, SOAR, UEBA (User Entity Behavior Analytics)

Zero Trust and Regulatory Requirements

Zero Trust directly supports compliance with:

  • NIS2: Network segmentation, MFA, and access management are explicitly required
  • ISO 27001: Annex A controls for access control, cryptography, and network security
  • GDPR: Data Protection by Design, access logging, data minimization
  • DORA (financial sector): ICT risk management, incident reporting, third-party risk

Further information: AWARE7 Security Architecture Consulting

Sources & References

  1. [1] NIST SP 800-207 - Zero Trust Architecture - National Institute of Standards and Technology
  2. [2] Forrester Research - The Definition of Modern Zero Trust - Forrester Research
  3. [3] BSI - Zero Trust Architekturen - Bundesamt für Sicherheit in der Informationstechnik

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Jan Hörnemann
Jan Hörnemann

Chief Operating Officer · Prokurist

E-Mail

M.Sc. Internet-Sicherheit (if(is), Westfälische Hochschule). COO und Prokurist mit Expertise in Informationssicherheitsberatung und Security Awareness. Nachwuchsprofessor für Cyber Security an der FOM Hochschule, CISO-Referent bei der isits AG und Promovend am Graduierteninstitut NRW.

11 Publikationen
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)
This article was last edited on 03.03.2026. Responsible: Jan Hörnemann, Chief Operating Officer · Prokurist at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung