Module 5: Zero Trust Security Fundamentals
Identity-based security, mTLS, trust domains, and microsegmentation for cloud-native systems
3 hours. 2 hands-on labs. Free course module.
Learning Objectives
- Understand Zero Trust principles for cloud-native systems
- Implement mutual TLS between services
- Design trust domains and microsegmentation
- Plan east-west security for Kubernetes clusters
Why This Matters
Zero Trust is not optional for production Kubernetes. Without it, a single compromised pod can access every service in the cluster. With it, compromise is contained and detected. This module gives you the conceptual foundation that SPIFFE, Envoy, and OPA implement in later modules.
Lesson Content
Zero Trust is not a product. It is an architecture principle: never trust, always verify. Every request — regardless of where it comes from — must be authenticated, encrypted, and authorized before it is processed.
Zero Trust Principles for Cloud Native
- Identity is the new perimeter: Cryptographic workload identity replaces network location
- Encrypt everything: mTLS for all service-to-service communication
- Verify continuously: Not just at connection establishment — on every request
- Least privilege: Services access only what they need, verified by policy
- Assume breach: Design so a compromised service cannot access everything
Mutual TLS (mTLS)
Regular TLS only verifies the server. mTLS verifies both sides. The client presents a certificate proving its identity, and the server verifies it before accepting the connection. This is the transport-layer foundation of zero trust.
Microsegmentation
Instead of one large trusted network, microsegmentation creates fine-grained security boundaries around individual services or groups of services. Combined with identity-based policies, it limits the blast radius of any breach to the compromised segment.
East-West Security
North-south traffic (external to cluster) gets security attention by default — load balancers, WAFs, API gateways. East-west traffic (service to service inside the cluster) is often unencrypted and unauthenticated. Zero trust means east-west traffic gets the same security treatment as north-south.
Real-World Use Cases
- mTLS between all production services
- Microsegmentation for PCI-DSS compliance
- East-west encryption in financial services
- Zero trust architecture for healthcare data
Common Mistakes
- Thinking NetworkPolicies alone = zero trust (they do not encrypt or authenticate)
- Implementing mTLS but not authorization (authenticated does not mean authorized)
- Deploying zero trust for external traffic only, ignoring east-west
- Using long-lived certificates instead of short-lived automatically rotated ones
Production Story
A healthcare company passed their HIPAA audit only after implementing mTLS between all services handling patient data. NetworkPolicies alone were insufficient — the auditor required encrypted, authenticated service communication.
Career Relevance
Zero trust is the industry direction. Engineers who can implement mTLS and microsegmentation are increasingly required for security-sensitive industries.
Key Terms
- mTLS
- Mutual TLS — both client and server verify certificates
- Microsegmentation
- Fine-grained network boundaries around individual services
- East-West Traffic
- Service-to-service communication inside the cluster
- North-South Traffic
- External traffic entering/leaving the cluster
- Zero Trust
- Security model: never trust, always verify, regardless of source
Hands-On Labs
-
Implement mTLS Between Services
Set up manual mTLS between two services to understand the fundamentals.
30 min - Intermediate
- Generate CA and service certificates with OpenSSL
- Configure two services to require client certificates
- Verify mutual authentication succeeds
- Test that connections without certificates are rejected
-
Simulate Zero Trust Networking
Compare flat network vs microsegmented zero trust architecture.
35 min - Intermediate
- Deploy services on a flat network — observe unrestricted access
- Add NetworkPolicies for microsegmentation
- Add mTLS for encryption and authentication
- Document the security improvement at each layer
Key Takeaways
- Zero Trust = never trust, always verify, regardless of network location
- mTLS authenticates both client and server — the transport layer of zero trust
- Microsegmentation limits blast radius by creating fine-grained security boundaries
- East-west traffic needs the same security as north-south traffic
- Identity + encryption + authorization = the three layers of zero trust