Zero Trust 802.1X

Principles

  1. Never trust, always verify

  2. Assume breach

  3. Least privilege access

  4. Continuous verification

Implementation

Identity Verification

  • Certificate-based authentication (EAP-TLS)

  • Multi-factor where possible

  • Machine + user authentication (EAP-TEAP)

Device Posture

  • Posture assessment

  • Compliance checking

  • Continuous monitoring

Microsegmentation

  • SGT-based segmentation

  • DACL enforcement

  • Minimal lateral movement