ZTNA: Zero Trust Network Access
Zero Trust Network Access (ZTNA) is a security model that provides secure remote access to applications based on identity and context, not network location. Unlike VPNs that grant broad network access, ZTNA provides granular, application-level access without exposing internal networks.
ZTNA: Zero Trust Network Access Explained
Zero Trust Network Access (ZTNA) is a security model that provides secure remote access to applications based on identity, device posture, and context, rather than network location. Unlike traditional VPNs that grant broad access to entire internal networks once authenticated, ZTNA provides granular, application-level access without ever exposing the internal network to the client. ZTNA is a core component of Zero Trust Architecture and a key service in SASE (Secure Access Service Edge) frameworks.
To understand ZTNA properly, it helps to be familiar with zero trust principles, VPN limitations, and identity management.
┌─────────────────────────────────────────────────────────────────────────┐
│ ZTNA Architecture │
├─────────────────────────────────────────────────────────────────────────┤
│ │
│ User ──→ ZTNA Connector ──→ ZTNA Gateway (Cloud) ──→ Application │
│ (on device) (PoP) (Internal) │
│ │
│ Traditional VPN: ZTNA: │
│ ┌─────────────────────────┐ ┌─────────────────────────────┐ │
│ │ User → VPN Gateway → │ │ User → ZTNA Gateway → App │ │
│ │ Full Network │ │ (only specific ports) │ │
│ │ Access │ │ (no network exposure) │ │
│ └─────────────────────────┘ └─────────────────────────────┘ │
│ │
│ Key Features: │
│ • Identity-based access (user, group, role) │
│ • Device posture checking (compliance, patch level, antivirus) │
│ • Application-level access (not network-level) │
│ • Resources hidden by default (invisible to unauthorized) │
│ • Continuous verification (not just at login) │
│ │
└─────────────────────────────────────────────────────────────────────────┘
What Is Zero Trust Network Access?
Zero Trust Network Access is a security technology that provides secure remote access to applications without placing users on the internal network. Unlike VPNs that grant broad network access, ZTNA establishes encrypted connections directly between the user's device and specific applications. The ZTNA gateway acts as a reverse proxy or forward proxy, brokering connections only after verifying identity, device health, and context. Resources are hidden from unauthorized users, reducing attack surface.
- Application-Level Access: Users connect to specific applications, not entire networks. No IP addresses or ports exposed to clients. No lateral movement possible.
- Identity-Centric: Access decisions based on user identity, group membership, role, and contextual factors (location, time). Integrated with Identity Provider (IdP) for authentication and policy enforcement.
- Device Posture Checking: Verify device compliance: managed device status, disk encryption, antivirus, patch level, and OS version. Non-compliant devices limited access or denied.
- Resources Hidden by Default: Applications are invisible to unauthorized users. ZTNA gateway does not respond to unauthenticated probes, no open inbound ports on internal network.
- Continuous Verification: Not just one-time authentication. Session monitored for anomalies, re-verified periodically, and can be terminated if risk increases.
Why ZTNA Matters
Traditional VPNs were designed for a different era (data center-centric, limited remote work). ZTNA addresses their fundamental security flaws.
- VPN Over-Privilege: VPN grants full network access once authenticated (attackers roam laterally). Users have more access than needed for their job. One compromised credential exposes entire network.
- Lateral Movement Risk: After VPN compromise, attackers pivot to other systems (scan internal network, find databases, exploit unpatched servers). ZTNA prevents lateral movement (no network access).
- Hidden Attack Surface (ZTNA): VPN gateways are publicly exposed (port 443/1194 etc.). ZTNA gateways are also public but applications hidden. ZTNA hides internal resources, making discovery harder.
- Scalability Issues with VPN: VPN concentrators limited throughput for many concurrent users. ZTNA gateways are cloud-native, scale elastically. No backhaul to data center for cloud apps.
- Poor User Experience (VPN): Full-tunnel VPN routes all traffic, causing latency. ZTNA uses split tunneling: only application traffic goes through ZTNA. Internet traffic bypasses (faster).
- Device Security: VPN trusts device once connected (no posture check). ZTNA verifies device compliance before granting access and can re-check.
Aspect Traditional VPN ZTNA
─────────────────────────────────────────────────────────────────────────────
Access Level Full network access Application-level
Lateral Movement Possible (internal network) Not possible (no network)
Hidden Resources No (IPs exposed) Yes (invisible)
Inbound Ports Required (VPN gateway) Required (connector outbound)
Scalability Limited (concentrator) High (cloud-native)
Device Posture No Yes (compliance check)
Continuous Verification No Yes (session monitoring)
Cloud Optimization Backhaul to DC Direct to cloud
User Experience Full tunnel (all traffic) Split tunnel (app only)
ZTNA Deployment Models
| Model | Description | Best For |
|---|---|---|
| Cloud-Delivered (SASE) | ZTNA as cloud service (PoP network) | Remote workers, cloud apps, SASE integration |
| On-Premises (Self-Managed) | ZTNA gateway within data center | Regulated industries (data sovereignty), existing investment |
| Endpoint-Initiated | Client agent to cloud gateway to internal app | Most remote worker scenarios |
| Service-Initiated | Gateway directly connects to internal app | Server-to-server, no client install |
How ZTNA Works
Endpoint-Initiated (User-to-App)
User installs lightweight ZTNA client or uses browser. User authenticates to Identity Provider (SSO). ZTNA gateway verifies identity, device posture, and authorizes access to specific applications. Gateway proxies connection to internal application (no direct network path). User sees only allowed applications.
Service-Initiated (App-to-App)
For server-to-server or API access, the ZTNA connector (lightweight agent) runs inside network. Connector establishes outbound tunnel to ZTNA gateway. External service connects to gateway, gateway routes through connector to internal app. No inbound firewall holes required.
Endpoint-Initiated ZTNA:
1. User opens ZTNA client or browser
2. Client authenticates to Identity Provider (SSO, MFA)
3. IdP sends token to ZTNA gateway
4. Gateway checks device posture (compliance, AV, patch)
5. Gateway consults policy engine (user → allowed apps)
6. Gateway establishes encrypted tunnel (mTLS) to internal application
7. User accesses application (limited to whitelisted apps)
8. Gateway monitors session (re-verification periodically)
Service-Initiated ZTNA:
1. Internal app runs ZTNA connector (outbound tunnel)
2. Connector connects to ZTNA gateway (no inbound firewall rules)
3. External service connects to gateway (authenticates)
4. Gateway routes via connector to internal app
ZTNA vs Other Technologies
Technology Primary Use Key Difference
─────────────────────────────────────────────────────────────────────────────
ZTNA Remote app access Application-level, no network
VPN Remote network access Full network access
SD-WAN Branch connectivity Site-to-site, not user
SASE Cloud networking + security ZTNA is component of SASE
Zero Trust Security model (broader) ZTNA is implementation
VDI / DaaS Virtual desktop Full desktop (not just app)
ZTNA Implementation Considerations
- Identity Provider Integration: ZTNA relies on strong identity (SSO, MFA). Integrate with existing IdP (Azure AD, Okta, Ping). Enforce phishing-resistant MFA (WebAuthn, passkeys).
- Device Posture Checks: Define compliance policies (managed device only, disk encryption required, antivirus running, OS patch level). Use MDM or EDR for device attestation.
- Application Discovery: Cannot protect what you cannot see. Inventory all applications (internal and cloud). Classify by sensitivity and user access needs.
- Legacy Applications: Some apps may not support modern authentication. Use ZTNA connector with header injection (add user headers). May need application delivery controller in front.
- Split Tunneling vs Full Tunnel: Split tunnel routes only app traffic through ZTNA (better performance). Full tunnel routes all traffic through gateway (more secure, more latency). Choose based on security requirements.
- Fallback for Unsupported Clients: Provide browser-based access for devices without ZTNA agent. Use HTML5 gateway (less functionality). Plan for gradual agent rollout.
Identity & Access:
□ Integrate with corporate IdP (Azure AD, Okta)
□ Enforce MFA (prefer phishing-resistant)
□ Define access policies (user, group, role)
Device Security:
□ Enforce device compliance (MDM, EDR)
□ Check OS version, patches, antivirus
□ Block non-compliant devices
Application Inventory:
□ Discover all internal and cloud apps
□ Classify by sensitivity
□ Assign permitted users per app
Deployment:
□ Start with pilot group (IT dept)
□ Roll out to remote users gradually
□ Migrate from VPN (phase out)
□ Provide browser fallback
ZTNA Anti-Patterns
- ZTNA as Just VPN in Cloud: Vendor solution is just hosted VPN (still grants network access). Ensure product provides application-level segmentation, not just a cloud proxy. Verify cannot "see" other networks.
- No Device Posture Checking: Trusting any device (personal, unmanaged) undermines zero trust. Enforce compliance for sensitive apps. Use client certificate or device attestation.
- Overly Permissive Policies: Granting "all apps" to users defeats micro-segmentation. Apply least privilege (only specific applications needed). Regularly audit policies.
- Ignoring Internal Threats: ZTNA for remote access but not internal users (still on network). Internal users also need ZTNA (no trusted inside). Extend ZTNA to office users (optional when network fully zero trust).
- No Continuous Monitoring: Initial authentication only, session never rechecked. Attacker can hijack session after login. Implement session expiry, re-authenticate for sensitive actions, monitor for anomalies (impossible travel, new device).
[X] Using ZTNA as VPN replacement (still full network)
[X] No device posture checks (all devices trusted)
[X] Overly permissive policies (users get too many apps)
[X] Only for remote access (ignoring internal users)
[X] One-time authentication only (no session expiry)
[X] Not logging access attempts (no audit)
[✓] Application-level access only
[✓] Enforce device compliance before access
[✓] Least-privilege policies (per app)
[✓] Extend ZTNA to internal and remote users
[✓] Continuous verification (session expiry, re-auth)
[✓] Log all access for audit
ZTNA Best Practices
- Start with High-Value Applications: Begin with critical apps (finance, HR, customer data). Expand to general apps after success. Measure reduction in risk for targeted apps.
- Enforce Phishing-Resistant MFA: Password + TOTP is not zero trust. Use WebAuthn (passkeys, hardware keys) for phishing-resistant authentication. Combine with device trust.
- Implement Least Privilege Policies: Grant users only applications needed for role, not all apps. Regularly review and remove unused permissions.
- Monitor and Log All Access: Who accessed which application, from where, when. Detect anomalies (unusual time, location, behavior). Integrate with SIEM for correlation.
- Phase Out VPN Gradually: Do not cut over overnight (user disruption). Run ZTNA in parallel with VPN. Migrate user groups one by one. Provide documentation and training.
- Plan for Offline Access: Some users need offline access (air travel, remote sites). Use offline tokens or local cache. Ensure policies expire appropriately.
- Test Degraded Mode: What happens when ZTNA gateway unreachable? Graceful failure (fallback to VPN? local cache?). Monitor gateway health.
Policy Type Rule
─────────────────────────────────────────────────────────────────────────────
User-Based Engineering group can access Jira, Confluence, GitLab
Finance group can access ERP, banking portal
HR group can access HRIS, payroll
Context-Based Access permitted only during business hours (9am-5pm)
Access blocked from high-risk countries
MFA required for new devices (trusted for 30 days)
Device-Based Company-managed device: all apps
Personal device: browser-only, limited apps
Non-compliant device (no antivirus): denied
Risk-Based Normal risk: standard access
High risk (new location): step-up MFA
Critical app (financial): require hardware key
Popular ZTNA Vendors
| Vendor | Deployment Model | Key Features |
|---|---|---|
| Zscaler Private Access (ZPA) | Cloud-delivered | Large PoP network, SASE integration |
| Cloudflare Zero Trust | ||
| Developer-friendly, global anycast | ||
| Netskope Private Access (NPA) | Cloud-delivered | Strong CASB integration, data protection |
| Palo Alto Prisma Access | Cloud-delivered | Next-gen firewall, SD-WAN integration |
| Cato Networks | Cloud-delivered (SASE) | Converged networking + security |
| Cloud-delivered | Office 365 integration, Entra ID |
Frequently Asked Questions
- Is ZTNA the same as Zero Trust?
No. Zero Trust is a security model (never trust, always verify). ZTNA is a technology implementing zero trust for remote access. Zero Trust includes other components: micro-segmentation, identity governance, continuous monitoring, device trust. - Can ZTNA replace my VPN entirely?
For most remote access scenarios, yes. ZTNA provides better security and user experience. However, for site-to-site VPN (branch connections) or legacy applications that require network-layer access, you may need both during transition. - Does ZTNA work for non-web applications? (SSH, RDP)
Yes, with a client agent. ZTNA can proxy SSH, RDP, VNC, database protocols. The client intercepts traffic and forwards to ZTNA gateway. TCP applications work as long as they use standard ports. - How does ZTNA handle split tunneling?
ZTNA uses split tunneling by default: only application traffic goes through gateway. Internet traffic bypasses ZTNA (direct), reducing latency. VPN often uses full tunnel (all traffic backhauled). Split tunneling improves performance but requires careful policy to prevent leakage. - What is the difference between ZTNA and SASE?
SASE is converged networking (SD-WAN) + security (ZTNA, SWG, CASB, FWaaS). ZTNA is one security component of SASE. SASE delivers ZTNA as part of integrated cloud service. - What should I learn next after ZTNA?
After mastering ZTNA, explore zero trust architecture, SASE for cloud-delivered security, micro-segmentation for internal networks, identity management for access control, and phishing-resistant MFA (WebAuthn, passkeys).
