Zero Trust Access Lab

This lab demonstrates a Zero Trust model where internal applications are not exposed to the public internet. Access is enforced via identity-based policies.

Architecture

Access Flow

  1. User connects via browser
  2. Authentication enforced
  3. Traffic passes through access proxy
  4. Tunnel connects to internal app

Key Points