TLDR: For Zero Trust every user, device, and system must prove its legitimacy every time it requests access to company resources (such as logging into email or cloud accounts). Zero trust architecture forces checks on device health, location, and behavior before granting access to login. This prevents unknown devices from accessing company resources.
According to NIST SP 800-207 “Zero trust assumes there is no implicit trust granted to assets, or user accounts based solely on their physical or network location”. Traditionally, we would secure company networks using physical firewalls. Think of a firewall as a box at the edge of your network, sort of like the front door. However, when your users are collaborating on documents stored in the cloud, the need for users to “connect” to the corporate network becomes obsolete. We can no longer consider a physical location as trusted, we needed a way to identify devices regardless of the network and enforce controls upon them. This is where Zero Trust (ZT) comes from. ZT attempts to solve this by forcing devices to be known in order to grant access to a resource. Now, “Zero trust architecture (ZTA) uses zero trust principals to plan industrial and enterprise infrastructure and workflows”. So as we build new network infrastructure into and beyond 2025, ZTA is the new gold standard for network and endpoint security.
TLDR: Zero trust architecture works by having a system in place that says YES or NO when a user requests a login to company resources such as email, cloud resources like Salesforce or HubSpot, or before opening specific applications from a device that meets specific requirements.
ZTA: Core Zero Trust Logical Components. Source: NIST SP 800-207
Let’s try to break down Zero Trust (ZT) from ZTA, both equally important.
Zero Trust Architecture (ZTA) has as few core components required to make the ecosystem work.
The other pieces in the diagram are important, but they sometimes overlap with other enterprise systems that might already be in use in your infrastructure.
ZTA has a lot of moving components and no two networks will have the same ZTA. Some networks might lack specific components and will still be able to function. The best place to start is at your Identity Provider. Your IDP is at the heart of authentication and access controls. Is it scalable for the cloud? Is there conditional access logic that can be applied to enforce a Policy Enforcement Point (PEP)?
Looking at the Risk Management Framework side, ZTA reduces the reliance on network perimeter defenses. Therefore, the same risk management framework should be followed. NIST Risk Management Framework (RMF) [SP800-37]
From the Privacy Framework side of the house, “Organizations will need to identify any possible risks associated with
intercepting, scanning, and logging network traffic [NISTIR 8062]”.
One of the most effective tools available today is Cisco Duo Device Health, part of Cisco’s broader Zero Trust Access Platform. Duo Device Health ensures that only secure, trusted, and compliant devices can access your systems, even before authentication happens. Duo constantly evaluates device health, ensuring compliance even after login.
Duo Device Health can deny access to devices that do not meet specific requirements, such as a firewall or bitlocker enabled.

This approach drastically reduces risk because even if credentials are stolen or malware enters the network, Zero Trust segmentation and continuous authentication prevent it from spreading or doing damage. With tools like Duo Device Health, you can enforce Zero Trust or Zero Trust Architecture principles instantly.
TLDR; Zero trust architecture prevents unknown devices from gaining access to company resources based off of location, cybersecurity baselines, or authentication requirements.
Technical Control
$$
DUO Device Health
23 CRR-NY 500.2
23 CRR-NY 500.12
23 CRR-NY 200.16
Zero Trust Architecture
New York, USA