ZTNA (Zero Trust Network Access) is a security architecture that is designed to provide secure access
to network resources for users, devices, and applications. It is based on the principle of "never trust,
always verify," which means that all access to network resources is subject to strict verification and
authentication.
Two functions of ZTNA are:
ZTNA provides a security posture check: ZTNA checks the security posture of devices and users that
are attempting to access network resources. This can include checks on the device's software and
hardware configurations, security settings, and the presence of malware.
ZTNA provides role-based access: ZTNA controls access to network resources based on the role of the
user or device. Users and devices are granted access to only those resources that are necessary for
their role, and all other access is denied. This helps to prevent unauthorized access and minimize the
risk of data breaches.