Internet-Draft zt-consideration December 2025
Li & Wang Expires 4 July 2026 [Page]
Workgroup:
Zero Trust Working Group
Internet-Draft:
draft-li-zt-consideration-00
Published:
Intended Status:
Standards Track
Expires:
Authors:
X. Li
China Telecom
A. Wang
China Telecom

Consideration of Applying Zero Trust Philosophy in Network Infrastructure

Abstract

Network security has traditionally relied on a perimeter-centric model, assuming that traffic originating within the network can be implicitly trusted. This model is fundamentally challenged by modern, highly distributed, and software-driven network environments where internal compromise is a realistic and high-impact threat scenario. This document examines the critical limitations of edge-only network protection and the systemic risks that arise from insufficient internal validation. Once the network perimeter is bypassed, the absence of internal protection mechanisms facilitates rapid lateral movement, impersonation of network entities, and interference with critical control and management functions. The document argues that Zero Trust (ZT) principles, which mandate continuous, dynamic verification of all entities and communications regardless of network location, are necessary to address contemporary threat models. Deploying ZT-aligned network protection mechanisms beyond the network edge is essential to build resilient, controllable, and trustworthy networks.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 4 July 2026.

Table of Contents

1. Introduction

Traditional network security architectures in operator and enterprise environments have long been built around a perimeter-centric protection model. In this model, security mechanisms are primarily deployed at network edges—such as access networks, inter-domain boundaries, or gateway nodes—under the core assumption that traffic originating inside the network can be inherently trusted once it passes the perimeter. This assumption of Implicit Trust reflected earlier network environments in which infrastructures were relatively static, tightly controlled, and operational roles were clearly separated. In such contexts, perimeter-based protection provided a reasonable balance between security and operational complexity.

Modern networks, however, have evolved into highly distributed, virtualized, and software-driven systems. Automated orchestration, programmable control planes, open management interfaces, and closed-loop control systems significantly expand the internal attack surface and increase the potential impact of internal failures or compromise. As a result, threats originating from within the network can no longer be treated as exceptional or out of scope. The reliance on Implicit Trust within the network creates a structural mismatch between the threat environment and deployed protection mechanisms.

This document examines the limitations of the perimeter-centric model and the necessity of applying Zero Trust principles to network protection itself. Zero Trust rejects trust based on network location and emphasizes continuous verification of entities and communications. Applying these principles within the network enables more robust containment of compromise and improved resilience of network operations.

2. Conventions used in this document

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].

3. Terminology

The following terms are used in this draft:

4. Current State of Network Protection

In today’s operational networks, the dominant security paradigm remains perimeter-centric. Most protection mechanisms are concentrated at the network boundary, reflecting the historical assumption of Implicit Trust for internal traffic. Common practices include:

This architectural approach originated in an era when networks were relatively static and infrastructure components were physically isolated. Under such conditions, deploying strong security controls only at the boundary was often sufficient and operationally efficient. However, the shift to virtualized, cloud-native, and software-driven networks has rendered this model increasingly fragile.

5. Risks of the Perimeter-Centric Model

A security architecture that relies primarily on edge-based protection exhibits a critical weakness: once the perimeter is breached, the internal network is left largely unprotected. This creates a "hard shell, soft interior" structure, leading to systemic risks across the network planes.

5.1. Data Plane Risks: Unrestricted Lateral Movement

A security architecture that relies primarily on edge-based protection exhibits a critical weakness: once the perimeter is breached, the internal network is left largely unprotected. This creates a "hard shell, soft interior" structure, leading to systemic risks across the network planes.

The core risk is the unrestricted lateral movement of an attacker who gains an initial foothold inside the network. Because internal traffic is subject to minimal verification, a compromised node can move across internal segments with limited resistance, accessing additional systems and services. Furthermore, the lack of internal validation mechanisms means that compromised nodes can easily impersonate other network elements or services, undermining trust relationships within the network. While edge-based mechanisms address external spoofing, they do not prevent a compromised internal entity from spoofing other internal entities.

5.2. Control Plane Risks: Integrity Exposure

Internal control protocols (e.g., routing, signaling) and management interfaces are often designed with the assumption of Implicit Trust. This exposure is critical because:

5.3. Management Plane Risks: API and Orchestration Vulnerability

Modern networks rely heavily on open APIs, software-defined networking (SDN) controllers, and automated orchestration systems. These systems manage the entire network state. If an attacker gains access to the management plane through a compromised internal entity, they can leverage the Implicit Trust to execute high-impact actions, such as reconfiguring security policies, redirecting traffic, or disabling critical network functions.

6. Necessity of Zero Trust Deployment Within the Network

Zero Trust (ZT) [NISTSP800207] principles address these challenges by eliminating Implicit Trust and requiring continuous, dynamic verification across the entire network. Trust is never implicit and must be continuously reassessed based on identity, context, and behavior. This approach is necessary for network protection for several reasons:

Applying Zero Trust to network protection implies that internal communications, forwarding behaviors, and control interactions must be subject to security enforcement similar to that applied at the perimeter. This requires the development of network mechanisms that can enforce policy based on identity and context, rather than just network address and location.

7. Conclusion

The evolution of network architectures and threat models has rendered traditional edge-only security approaches insufficient. While perimeter defenses remain necessary, they are no longer adequate on their own. A breach at the boundary can expose the internal network to rapid and wide-ranging compromise. Adopting Zero Trust principles within the network is therefore not optional, but essential. By shifting from static, perimeter-based trust to dynamic, continuous verification across all network segments, operators can build more resilient, controllable, and trustworthy networks. Zero Trust-aligned network protection transforms security from a boundary function into an intrinsic property of the network itself, better suited to the demands of modern and future network environments.

8. Security Considerations

This document is a Problem Statement and does not propose a solution. However, the deployment of Zero Trust principles within the network introduces its own set of security and operational considerations that must be addressed by any future solution. These include:

9. IANA Considerations

TBD

10. Acknowledgement

TBD

11. Normative References

[NISTSP800207]
"Zero Trust Architecture".
[RFC2119]
"RFC2119".
[RFC2827]
"Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing".

Authors' Addresses

Xueting Li
China Telecom
Beiqijia Town, Changping District
Beijing
Beijing, 102209
China
Aijun
China Telecom
Beiqijia Town, Changping District
Beijing
Beijing, 102209
China