Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Netzwerksicherheit Glossary

ZTNA (Zero Trust Network Access)

A network access method that replaces traditional VPNs. Instead of full network access, users and devices are granted access only to specific applications—following continuous verification of identity, device, context, and authorization.

ZTNA (Zero Trust Network Access) is the modern alternative to traditional VPN. While a VPN grants a user full network access (like a physical office key), ZTNA allows access only to specific, authorized applications—after continuous verification.

The Problem with Traditional VPN

Traditional VPN Model: User connects → Network tunnel → Access to EVERYTHING on the internal network (similar to a house key: once inside, access everywhere).

Problems:

  • Compromised VPN account = complete network access
  • Lateral movement: Attackers can move throughout the entire network
  • No context: It doesn’t matter if the device is compromised or the location is suspicious
  • Access rights are never granular enough
  • "Castle and Moat" – inside = trustworthy (wrong!)

ZTNA Principle: Never Trust, Always Verify

User wants to access Application A → ZTNA Policy Engine checks:

  • Identity (who is the user? MFA confirmed?)
  • Device (compliant? MDM-registered? no jailbreak?)
  • Context (normal time? known country? normal behavior?)
  • Authorization (is this user allowed to access Application A?)

Allowed: Access ONLY to Application A (not to the entire network). Denied: in case of suspicion, poor device status, unknown location.

ZTNA vs. VPN

FeatureTraditional VPNZTNA
Access modelNetwork level (everything)Application level (granular)
Lateral MovementPossible after VPN accessNot possible (no network access)
Device StatusNot checkedContinuously checked
Location/ContextNot evaluatedRisk-adaptive
ScalabilityCentralized gatewaysCloud-native, no hardware
User ExperienceSplit-tunnel issuesApp-specific, transparent
Zero-Day VPN CVELarge attack surfaceNo publicly exposed VPN

ZTNA Architecture

Agent-based ZTNA

Components: Endpoint agent (on every device) ↔ ZTNA Control Plane (Cloud) → Policy Engine ↔ Application Connector (in front of every application in the data center)

Flow: User → Agent authenticates via MFA → Agent sends user ID, device status, location → Policy Engine decides: Access to CRM allowed (not to ERP) → Agent opens encrypted tunnel ONLY to the CRM app.

Agentless ZTNA (browser-based)

User opens browser → ZTNA portal URL → Identity verification (Azure AD, Okta) → Browser session with proxy access to approved web apps. No installation required—ideal for contractors and BYOD devices.

ZTNA Products

ProviderFeatures
Zscaler Private Access (ZPA)Market leader, cloud-native
Cloudflare AccessAffordable, simple, high performance
Microsoft Entra Private AccessAzure AD integration, M365-native
Palo Alto Prisma AccessNGFW integration, SASE platform
Cisco Secure AccessUmbrella integration
Check Point Harmony ConnectSMB-friendly

ZTNA as Part of SASE

SASE (Secure Access Service Edge) combines ZTNA with other cloud security features:

SASE = ZTNA + SWG + CASB + FWaaS + SD-WAN

  • SWG (Secure Web Gateway): URL filtering, SSL inspection
  • CASB: Cloud App Control (Shadow IT, DLP)
  • FWaaS: Firewall as a Service (Layer 7)
  • SD-WAN: Optimized Routing

Vendors: Zscaler, Cloudflare One, Netskope, Palo Alto SASE.

Implementation: Step by Step

  1. Identity (Weeks 1–4): All users in MFA-enabled IAM (Entra ID, Okta); Conditional Access: MFA for all application access
  2. Device Management (Weeks 4–8): MDM (Intune/Jamf) for all devices; Define device compliance policies; ZTNA accepts only compliant devices
  3. Application Discovery (Weeks 8–12): Which applications require remote access? Deploy ZTNA connectors in front of each application
  4. Replace VPN (Weeks 12–20): Run ZTNA and VPN in parallel; migrate department by department; disable VPN once 100% migrated
  5. Continue Zero Trust: Microsegment internal networks; UEBA, continuous risk analysis

ZTNA is the core of a Zero Trust Architecture—the first, most important step away from the "Castle and Moat" model.