zero-trust-architecture

Implement Zero Trust security model with identity verification, microsegmentation, least privilege access, and continuous monitoring. Use when building secure cloud-native applications.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "zero-trust-architecture" with this command: npx skills add aj-geddes/useful-ai-prompts/aj-geddes-useful-ai-prompts-zero-trust-architecture

Zero Trust Architecture

Table of Contents

Overview

Implement comprehensive Zero Trust security architecture based on "never trust, always verify" principle with identity-centric security, microsegmentation, and continuous verification.

When to Use

  • Cloud-native applications
  • Microservices architecture
  • Remote workforce security
  • API security
  • Multi-cloud deployments
  • Legacy modernization
  • Compliance requirements

Quick Start

Minimal working example:

// zero-trust-gateway.js
const jwt = require("jsonwebtoken");
const axios = require("axios");

class ZeroTrustGateway {
  constructor() {
    this.identityProvider = process.env.IDENTITY_PROVIDER_URL;
    this.deviceRegistry = new Map();
    this.sessionContext = new Map();
  }

  /**
   * Verify identity - Who are you?
   */
  async verifyIdentity(token) {
    try {
      // Verify JWT token
      const decoded = jwt.verify(token, process.env.JWT_PUBLIC_KEY, {
        algorithms: ["RS256"],
      });

      // Check token hasn't been revoked
      const revoked = await this.checkTokenRevocation(decoded.jti);
      if (revoked) {
        throw new Error("Token has been revoked");
// ... (see reference guides for full implementation)

Reference Guides

Detailed implementations in the references/ directory:

GuideContents
Zero Trust GatewayZero Trust Gateway
Service Mesh - MicrosegmentationService Mesh - Microsegmentation
Python Zero Trust Policy EnginePython Zero Trust Policy Engine

Best Practices

✅ DO

  • Verify every request
  • Implement MFA everywhere
  • Use microsegmentation
  • Monitor continuously
  • Encrypt all communications
  • Implement least privilege
  • Log all access
  • Regular audits

❌ DON'T

  • Trust network location
  • Use implicit trust
  • Skip device verification
  • Allow lateral movement
  • Use static credentials

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

api-security-hardening

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-compliance-audit

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-testing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

web-performance-audit

No summary provided by upstream source.

Repository SourceNeeds Review