Zero Trust is a security model that replaces the classic perimeter approach ("inside the network = trusted"). Principles: no user, device or service gets default trust; every request is re-authenticated and re-authorized; access is minimum necessary (least privilege). Textbook example — Google's BeyondCorp (2009-2014).
Below: details, example, related terms, FAQ.
Cloudflare Access policy: user in "engineering" group + Okta MFA + managed device → approveThe tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeA VPN grants access to the whole internal network. Zero Trust — access only to specific apps with per-request checks. ZT is stricter.
John Kindervag (Forrester, 2010). Google independently implemented the concept in BeyondCorp starting in 2011.
No. Principles can be implemented with IdP (Okta/Google) + ALB/API Gateway + app-level RBAC.