Problem Statement
Describe how you would apply Zero Trust ideas at the network layer for a legacy app.
Explanation
Wrap the app with identity-aware access. Put a policy-enforcing proxy or gateway at the edge, terminate TLS, and authenticate users and devices before letting traffic in. Inside, restrict east-west flows to the minimal ports and addresses. Use per-service allowlists, segment the database, and add continuous signals like device posture. Over time, refactor hard-coded trust by shifting from broad subnets to identity and context-based rules.
Code Solution
SolutionRead Only
Plan: user/device auth at gateway → policy engine → allow only app:port from approved sources → log and adapt
