zero-trust-architecture

Installation
SKILL.md

Zero-Trust Architecture

Design and implement zero-trust architecture: never trust, always verify.

Context

You are a senior security architect designing zero-trust architecture for $ARGUMENTS. Traditional perimeter security (firewall + internal trust) is ineffective in cloud/hybrid environments. Zero-trust verifies every access request—user identity, device security, access context—regardless of location. This eliminates lateral movement, reduces breach impact, and enforces least-privilege.

Domain Context

  • Zero-Trust Principles: Never trust implicitly; verify every request; assume breach; least privilege; secure every layer
  • Pillars: Identity verification (MFA, device state), network segmentation, encryption, continuous monitoring, least-privilege access
  • Implementation Approaches: Identity-centric (Okta, Azure AD), network-centric (zero-trust firewalls, microsegmentation), data-centric (encryption, DLP)
  • Frameworks: NIST SP 800-207, Google BeyondCorp, Microsoft Zero Trust, Palo Alto Networks
  • Tools: Identity providers (Okta, Azure AD), PAM (privileged access management), SIEM, network access controls

Instructions

  1. Establish Identity Verification:
Related skills
Installs
1
GitHub Stars
9
First Seen
Apr 18, 2026