Skip to main content
Star us on GitHub Star

Zero Trust Models

All OpenZiti deployment architectures can be categorized by three types of Zero Trust Edge Access Security Models. Many of them will be overlapping at least 2 of these initially, especially the brownfield deployments. That gives customers a great deal of flexibility in terms of deployment options depending on where they are in the journey to eventually reach the ZiTi Application Access Security Model, i.e most secured.

App Access (ZTAA)

The Zero Trust is maintained between Applications, and the encryption terminated in Applications

image


Host Access (ZTHA)

The Zero Trust is maintained between Application Hosts, and the encryption terminated at Application Hosts  

image


Network Access (ZTNA)

The Zero Trust is only maintained between Ziti Private Edge Routers, and the encryption is terminated at Ziti Private Edge Routers  

image