Zero Trust Architecture
Never trust, always verify — identity, device, network, and session evaluated continuously.
Overview
Zero Trust removes implicit trust from the network by enforcing strict identity, device compliance, microsegmentation,
and continuous access evaluation. This pillar documents foundational endpoint/network controls, cloud-native Zero Trust
enforcement, and advanced segmentation and real-time policy labs across Microsoft and AWS environments.
Completed Labs
AWS VPC Segmentation & Security Groups
✓ Completed
EC2 Access & Least-Privilege Paths
✓ Completed
Configuring a Network Firewall
✓ Completed
NIDS/HIDS Alert Analysis
✓ Completed
In Progress Labs
Investigating ARP Poisoning
In Progress
Performing Active Reconnaissance
In Progress
Setting up a Load Balancer
In Progress
IoT Management Controls
In Progress
Wireless Attack & Mitigation Techniques
In Progress
Device Onboarding — Entra Join
In Progress
Conditional Access — Device Compliance
In Progress
Mobile App Protection Policies (MAM)
In Progress
Windows Autopilot — User-Driven Enrollment
In Progress
Advanced Zero Trust Labs
Cloud-native microsegmentation and continuous access evaluation for high-trust environments.