The Problem with "Castle and Moat" Security
For decades, enterprise security followed the castle-and-moat model: build a strong perimeter (firewall), assume everything inside is trustworthy, and protect against external threats. This worked when employees sat at desks behind corporate firewalls and applications ran in data centers.
Then the world changed. Cloud infrastructure scattered across regions. Remote work became permanent. Contractors, partners, and AI agents needed infrastructure access. The perimeter dissolved, but many security architectures didn't adapt.
The result? Breaches where attackers enter through a single compromised credential and move laterally across the entire infrastructure. According to IBM's 2024 Cost of a Data Breach report, the average time to identify and contain a breach is 277 days. That's nine months of unrestricted access.
What Zero Trust Actually Means
Zero trust is simple in principle: never trust, always verify. Every access request must be authenticated, authorized, and encrypted—regardless of where it originates. There is no "inside" or "outside" the network. There is only authenticated and authorized, or denied.
Five Pillars of Zero Trust Infrastructure Access
- Verify Identity Explicitly
Use strong authentication with MFA for every access attempt
- Least Privilege Access
Grant minimum necessary permissions, just-in-time
- Assume Breach
Minimize blast radius and verify end-to-end with encryption
- Continuous Verification
Re-verify identity and authorization throughout sessions
- Comprehensive Visibility
Log and analyze all access for anomaly detection
Implementing Zero Trust with Certificate-Based Access
The foundation of zero trust infrastructure access is eliminating long-lived credentials. Static passwords, SSH keys, and cloud access keys are security liabilities—they can be stolen, shared, and persist indefinitely.
Short-lived certificates solve this. Instead of storing a password or key, users and systems prove their identity to a certificate authority, which issues a cryptographically signed certificate valid for hours, not years.
# Traditional SSH access (what NOT to do)
# Long-lived key, no audit trail, no context
ssh -i ~/.ssh/id_rsa user@production-server
# Zero trust certificate-based access
# 1. Authenticate with SSO (MFA required)
tac login
# 2. Request access with context
tac ssh user@production-server \
--reason="Investigating CPU spike in ticket INC-12345"
# 3. TigerAccess:
# - Verifies your identity via SSO
# - Checks RBAC roles and allowed resources
# - Issues 4-hour certificate with metadata
# - Logs request with full context
# - Establishes mTLS connection
# - Records entire session
# 4. Certificate auto-expires
# No cleanup needed, zero standing accessJust-In-Time Access: The Key to Least Privilege
Traditional access control grants standing permissions. You're added to the "database-admins" group and have access forever. This creates sprawl—users accumulate permissions they no longer need, and auditing becomes impossible.
Zero trust requires just-in-time (JIT) access. Users request elevated permissions when needed, approvals happen through automated or human workflows, and access automatically expires.
Real-World JIT Workflow
10:00 AM: Developer needs to investigate production database issue
10:01 AM: Requests access via Slack: /access request postgres-prod reason="Investigating slow queries from INC-456"
10:02 AM: Manager approves via mobile push notification
10:03 AM: Developer receives 2-hour read-only certificate
12:03 PM: Certificate expires automatically, no cleanup needed
Compliance: Complete audit trail with reason, approval, and session recording
Device Trust: The Missing Piece
Identity isn't enough. Zero trust also requires device trust—verifying that the endpoint requesting access meets security requirements. An engineer with valid credentials on a compromised laptop shouldn't get access.
Modern device trust checks include:
- OS version and patch level - No outdated systems
- Disk encryption status - Full-disk encryption required
- EDR/antivirus running - Real-time threat protection active
- Device management enrollment - MDM-managed devices only
- Hardware-backed keys - TPM or Secure Enclave for crypto
When a user authenticates, the certificate authority checks these signals. If the device fails trust requirements, access is denied even with valid credentials.
Continuous Verification and Session Monitoring
Zero trust doesn't stop at authentication. Sessions must be continuously monitored for anomalous behavior. If a user typically accesses 5 databases and suddenly queries 50, that triggers alerts.
# TigerAccess monitors sessions in real-time
Session: user=alice resource=postgres-prod
Baseline Behavior (last 30 days):
- Average queries: 12/hour
- Tables accessed: 3-5
- Peak connections: 2 concurrent
Current Session Anomalies:
⚠️ Warning: 150 queries in 10 minutes (12.5x baseline)
⚠️ Warning: Accessed 25 tables (5x baseline)
🚫 CRITICAL: Attempted data export to external IP
Action Taken:
- Certificate revoked
- Session terminated
- SOC team alerted
- Incident ticket created
- User notified via SlackEncryption Everywhere: mTLS for Infrastructure
Zero trust requires that all infrastructure communication is encrypted and mutually authenticated. This is where mutual TLS (mTLS) comes in—both client and server present certificates, verify each other's identity, and establish encrypted connections.
With TigerAccess, every infrastructure connection uses mTLS:
- SSH connections: Certificate-based with host verification
- Database access: TLS with client certificate auth
- Kubernetes API: mTLS with namespace-scoped certificates
- Application access: HTTPS with client certificate verification
This prevents man-in-the-middle attacks, eavesdropping, and impersonation—all while providing the authentication context needed for zero trust.
The Audit Trail: Compliance and Forensics
Comprehensive logging is non-negotiable for zero trust. Every access attempt, successful or failed, must be logged with complete context for compliance audits and security investigations.
TigerAccess audit events include:
- Who: User identity, device ID, IP address
- What: Resource accessed, action performed, data modified
- When: Timestamp with millisecond precision
- Where: Geographic location, network context
- Why: Reason provided, ticket reference
- How: Protocol, client version, certificate details
- Result: Success, failure, error details
Migration Strategy: From VPN to Zero Trust
You don't have to rip out your existing infrastructure overnight. Here's a phased migration approach:
Phase 1: Visibility (Weeks 1-4)
- • Deploy TigerAccess in audit-only mode alongside VPN
- • Catalog all infrastructure resources and access patterns
- • Identify high-risk systems for priority migration
Phase 2: SSH Migration (Weeks 5-8)
- • Replace SSH key access with certificate-based authentication
- • Implement session recording for compliance
- • Start building RBAC policies
Phase 3: Database Access (Weeks 9-12)
- • Proxy all database connections through TigerAccess
- • Eliminate shared database credentials
- • Implement JIT access workflows
Phase 4: VPN Decommission (Weeks 13-16)
- • Migrate remaining systems to zero trust access
- • Enable device trust requirements
- • Sunset VPN infrastructure
Measuring Success
How do you know if your zero trust implementation is working? Track these metrics:
- Mean time to access (MTTA): How quickly can authorized users get access? Should be under 2 minutes.
- Standing privileges: What percentage of users have permanent elevated access? Goal is 0%.
- Certificate lifetime: Average certificate duration. Lower is better, aim for 4-8 hours.
- Anomaly detection accuracy: True positive vs. false positive rate for behavioral alerts.
- Audit completeness: Percentage of infrastructure access logged. Must be 100%.
Conclusion: Security Without Sacrifice
Zero trust isn't about making access harder—it's about making it safer and more auditable without sacrificing developer productivity. When implemented correctly, engineers get faster access to the resources they need, security teams get complete visibility, and compliance becomes automatic.
The question isn't whether to implement zero trust, but how quickly you can migrate before the next credential leak turns into a breach.