Zero-Trust AI Architecture

Zero trust is the operating model that abandons the network-perimeter assumption: there is no "inside" that is automatically trustworthy, no "outside" that is automatically hostile, and no implicit trust granted to a caller because of where they sit on the network. Every request — from a human, a service, a batch job, or a model itself — is authenticated, authorized, and recorded on its own merits, every time.

Applied to AI/ML, zero trust means: the inference path is treated as a hostile environment, model artifacts are signed and attested before they execute, every retrieval and tool call is authorized against the real caller's identity (not the model's), and every action is logged in a way that a forensic investigator can replay. This page walks through the six enforcement planes — identity, network, policy, data, workload, and continuous verification — that together constitute a zero-trust AI deployment.


1. Zero-Trust Tenets

NIST SP 800-207 distills zero trust into a set of tenets. Three of them carry the most weight in AI-system design:

The model that an LLM provides is itself an untrusted component under zero-trust thinking — the LLM may be misaligned, jailbroken, or compromised at the supply-chain level. Tools called by the LLM run with the real user's delegated authority, not with the model's blanket privileges, and every call is re-authorized at the policy decision point.


2. Enforcement Across an AI Request Lifecycle

The diagram below shows the six enforcement planes a request crosses on its way through an AI/ML system — from the originating user or workload through to the continuous-verification telemetry that watches the whole flow. Each plane is a place where a zero-trust policy is enforced; failures at one plane should be caught at the next.

┌──────────────────────────────────────────────────────────────────────────────┐
│                 USER / WORKLOAD INITIATES INFERENCE REQUEST                  │
│  ┌─────────────┐  ┌─────────────┐  ┌─────────────┐                           │
│  │   Human     │  │   Service   │  │   Batch     │                           │
│  │   User      │  │   Worker    │  │   Job       │                           │
│  └─────────────┘  └─────────────┘  └─────────────┘                           │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│                    1. IDENTITY PLANE  (Verify Explicitly)                    │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌─────┐             │
│  │  OIDC    │  │  SPIFFE  │  │   mTLS   │  │ Workload │  │ MFA │             │
│  │  Token   │  │  /SVID   │  │  Cert    │  │ Identity │  │/WAuth│            │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘  └─────┘             │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│           2. NETWORK PLANE  (Microsegmentation, No Implicit Trust)           │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐                      │
│  │  Service │  │  Egress  │  │  Policy  │  │  No East-│                      │
│  │   Mesh   │  │ Firewall │  │  Engine  │  │  West LAN│                      │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘                      │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│          3. POLICY DECISION POINT  (Least Privilege, Just-In-Time)           │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐                      │
│  │  OPA /   │  │  Cedar   │  │  ABAC +  │  │  JIT     │                      │
│  │ Rego     │  │  Policy  │  │  Context │  │  Tokens  │                      │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘                      │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│                  4. DATA PLANE  (Classify, Encrypt, Route)                   │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐                      │
│  │ Classify │  │  KMS /   │  │  Sens.   │  │ Tenant   │                      │
│  │ on Read  │  │  CMK     │  │  Routing │  │ Isolat.  │                      │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘                      │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│              5. WORKLOAD PLANE  (Signed & Attested Code/Models)              │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐                      │
│  │  Cosign  │  │  SBOM    │  │  TEE     │  │ Image    │                      │
│  │  Verify  │  │  +SLSA   │  │  Attest  │  │ Pinning  │                      │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘                      │
└──────────────────────────────────────────────────────────────────────────────┘
                                       │
                                       ▼
┌──────────────────────────────────────────────────────────────────────────────┐
│                 6. CONTINUOUS VERIFICATION  (Assume Breach)                  │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐                      │
│  │ Behavior │  │ Anomaly  │  │ Hash-    │  │  Token   │                      │
│  │ Analytic │  │ Detect.  │  │ Chained  │  │  Re-Auth │                      │
│  │  /UEBA   │  │  ML      │  │  Audit   │  │  /Rotate │                      │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘                      │
└──────────────────────────────────────────────────────────────────────────────┘

3. Identity Plane

The identity plane answers who is making this request? — for both humans and workloads. Bearer tokens alone are not sufficient; identity is established through cryptographic primitives that survive even if a single secret leaks.

A common mistake in agentic AI: treating the model's tool call as if the model were the principal. The real principal is the human who initiated the session; the model is acting on their behalf, and the policy decision point downstream must see the human's identity, scoped down to what the human is allowed to do via this particular tool.


4. Network Plane

The network plane removes implicit trust between hosts. There is no "flat internal network"; every connection is an authenticated, authorized, encrypted hop.


5. Policy Decision Point

A policy decision point (PDP) is the centralized place where every authorization question is answered. It receives a structured request — (principal, action, resource, context) — and returns allow/deny plus optional obligations.

For LLM tool use the PDP is the natural place to enforce "only this user, only this matter, only this tool, only this argument shape." The model proposes; the PDP disposes.


6. Data Plane

Data is treated as classified by default. The classification — not the user's request — determines where the data may be processed, what model tier may see it, and how long it lives.

See also: Data Residency & Sovereignty Routing, Right-to-Erasure in a Vector Store.


7. Workload Plane

A zero-trust workload plane treats every binary, container image, and model artifact as untrusted until proven otherwise. The bar to enter production is a chain of cryptographic evidence.

See also: Confidential Computing for On-Prem Inference, Supply-Chain Security for Model Artifacts.


8. Continuous Verification

"Assume breach" means the system never finishes verifying. Tokens expire quickly and rotate. Behavior is monitored continuously. Anomalies trigger re-authentication or session termination, not just an alert.

See also: Audit Log Integrity, Secrets & Key Rotation.


9. Failure Modes & Anti-Patterns

Zero-trust is undermined more often by a quiet shortcut than by a frontal failure. The patterns below show up repeatedly in AI deployments that nominally claim zero-trust posture but are not actually zero-trust:

The unifying lesson: zero-trust is not a product or a control — it is the discipline of removing implicit trust at every junction. Each plane in the diagram above is a place where implicit trust likes to creep back in.


↑ Back to Top