Zero Trust Decision Flow
Signals -> risk scoring -> policy decision -> enforcement -> immutable evidence. The operational loop that makes Zero Trust measurable.
Decision Flow
ZTA
Telemetry
Risk
Policies
Evidence
7 min
Last updated: 2026-01-04The loop
- Collect signals (identity, device, network, workload).
- Compute risk and trust posture.
- Evaluate policy and produce a decision.
- Enforce the decision close to the asset.
- Record immutable evidence and verify outcomes.
Signals
- Authentication and verification outcomes.
- Integrity state and tamper indicators.
- Patch and vulnerability posture.
- Unexpected east-west movement attempts.
Risk scoring
Risk scoring prioritizes what matters most using severity, criticality, and blast radius context.
Policy decision
Policies combine subject/resource/action/context to decide allow/deny/step-up/quarantine.
Enforcement
Enforcers apply segmentation and access controls; OT can use staged enforcement to avoid downtime.
Evidence
Every decision includes the “why”: which signals and policy version produced the action.
Examples
- High-risk remote admin -> require step-up verification and notify SOC.
- Integrity failure -> quarantine device and open an incident ticket.
- New lateral connection path -> block and alert until validated.