Table of Contents
- 1. Introduction to Zero Trust Concepts
- 2. Commercial Solutions
- 3. Open Source Alternatives
- 4. Gateway Integration
- 5. Australian Government Frameworks
- 6. Conclusion
- References
1. Introduction to Zero Trust Concepts
1.1 The Problem with Traditional Perimeter Security
Traditional network security operates on a "hard crunchy outside, soft chewy inside" model—once an attacker breaches the perimeter, they often have broad access to internal resources. This approach is increasingly inadequate because:
- Perimeter erosion: Cloud services, remote work, and mobile devices dissolve the traditional network boundary
- Lateral movement: Attackers who breach the perimeter can move freely within the network
- Implicit trust: Internal traffic is often trusted by default, enabling privilege escalation
- VPN limitations: Traditional VPNs provide broad network access rather than resource-specific authorization
1.2 Core Zero Trust Principles
Zero Trust is built on three foundational principles:
- Never Trust, Always Verify: No user, device, or application is trusted by default, regardless of location
- Assume Breach: Design systems as if an attacker is already present; contain blast radius through segmentation
- Verify Explicitly: Authenticate and authorize every access request based on all available data points
1.3 Key Architectural Components
| Component | Description |
|---|---|
| Identity Provider (IdP) | Centralized authentication and authorization (SSO, MFA) |
| Device Posture | Continuous assessment of device health and compliance |
| Policy Engine | Real-time evaluation of access requests against defined policies |
| Micro-segmentation | Network isolation at the resource level rather than subnet level |
| Continuous Monitoring | Ongoing verification and logging of all access attempts |
1.4 Security Challenges Addressed
Zero Trust architectures directly address:
- Insider threats: Least-privilege access limits damage from compromised credentials
- Ransomware propagation: Micro-segmentation prevents lateral movement
- Shadow IT: Identity-aware access controls bring unmanaged resources under governance
- Third-party access: Granular permissions for contractors and partners without network-level access
- Remote work security: Consistent security posture regardless of user location
2. Commercial Solutions
2.1 Tailscale
Overview: Tailscale is a mesh VPN built on WireGuard that creates secure, peer-to-peer connections between devices.
Key Features:
- Mesh architecture: Direct device-to-device connections without central traffic routing
- Identity-based networking: Integrates with Okta, Google Workspace, Microsoft Entra ID
- NAT traversal: Uses DERP relays when direct connections aren't possible
- Access Control Lists (ACLs): Fine-grained, JSON-based policies
- MagicDNS: Automatic DNS resolution for connected devices
- Subnet routing: Access entire networks through exit nodes
Architecture:
Devices ←→ Tailscale Client (WireGuard) ←→ Coordination Server
↓ ↓
DERP Relays (fallback) ACLs & Policies
Best for: Remote teams, cross-cloud connectivity, IoT device management
2.2 Twingate
Overview: Twingate provides Zero Trust Network Access (ZTNA) that replaces traditional VPNs with identity-aware, least-privilege access.
Key Features:
- Split tunneling by default: Only routes traffic to protected resources
- Resource-level access: Define access per application, not per network
- Zero trust segmentation: Micro-segmentation without network reconfiguration
- Device trust: Continuous device posture assessment
- No open ports: Resources remain invisible to the public internet
Advantages over Traditional VPN:
| Aspect | Traditional VPN | Twingate ZTNA |
|---|---|---|
| Network access | Full subnet access | Resource-specific |
| Attack surface | Public gateway | No exposed ports |
| User experience | All traffic routed | Split tunneling |
| Onboarding | Complex | Automated |
| Visibility | Limited | Full audit trails |
Best for: Organizations wanting to replace VPNs with modern ZTNA
2.3 Sidebar: IRAP-Assessed Options for Australian Government
For Australian Government entities requiring certified solutions, Zscaler offers the only IRAP-assessed zero trust platform at the PROTECTED level.
Zscaler Zero Trust Exchange™
- IRAP PROTECTED certified (2024 assessment)
- First cloud security/zero trust vendor to complete IRAP
- Comprehensive SASE platform (ZTNA, SWG, CASB, DLP)
- Australian Points of Presence for data sovereignty
When to Consider Zscaler:
- Government agencies requiring IRAP certification
- Organizations needing comprehensive SASE architecture
- Multi-cloud environments requiring unified policy enforcement
Trade-offs: Higher cost and complexity compared to Tailscale/Twingate; full SASE platform may be overkill for smaller organizations.
3. Open Source Alternatives
3.1 Headscale
Overview: Headscale is an open-source, self-hosted implementation of the Tailscale control server.
Key Features:
- Full Tailscale compatibility: Works with official Tailscale clients
- Self-hosted control plane: Complete data sovereignty
- Namespace-based ACLs: User and group access controls
- OIDC integration: Support for external identity providers
Architecture:
Tailscale Clients → Headscale Server (Self-hosted)
↓
SQLite/PostgreSQL Database
↓
DERP Relays (Self-hosted or public)
Best for: Organizations requiring complete control over control plane data
3.2 Pangolin
Overview: Pangolin is an open-source, identity-aware remote access platform built on WireGuard that combines reverse proxy and VPN capabilities.
Key Features:
- Dual access modes: Browser-based access for web apps, WireGuard VPN for network resources
- Identity integration: Connects to OIDC and OAuth2 providers
- Site connectors: Deploy connectors to extend access to any network
- Self-hosted: Complete control over infrastructure and data
Comparison with Commercial Solutions:
| Feature | Pangolin | Twingate | Tailscale |
|---|---|---|---|
| Open Source | ✅ | ❌ | Partial |
| Self-hosted | ✅ | ❌ | Via Headscale |
| WireGuard-based | ✅ | ✅ | ✅ |
| Web + VPN access | ✅ | ✅ | VPN only |
| Enterprise support | Community | Commercial | Commercial |
Best for: Organizations wanting open-source Twingate alternative with web + VPN access
3.3 Netbird
Overview: Netbird is an open-core zero trust networking platform built on WireGuard, offering both self-hosted and managed cloud options.
Key Features:
- WireGuard-based: Modern cryptography with excellent performance
- Open core model: Free self-hosted version with paid cloud offering
- Identity integration: Native OIDC support (Entra ID, Okta, Google)
- Device posture: Integration with Microsoft Defender and other EDR solutions
- Mesh networking: Direct peer-to-peer connections with relay fallback
Comparison with Headscale:
| Feature | Netbird | Headscale |
|---|---|---|
| Protocol | WireGuard | WireGuard (via Tailscale) |
| Client | Netbird-specific | Tailscale official |
| Device posture | Native EDR integration | Via ACLs |
| Deployment | Self-hosted or cloud | Self-hosted only |
Best for: Teams wanting WireGuard without Tailscale dependency; organizations requiring built-in device trust
4. Integration with Traditional Gateway Environments
4.1 Hybrid Architecture Patterns
Pattern 1: Gateway as Policy Enforcement Point
Internet → Gateway (Firewall/IPS) → Zero Trust Layer → Internal Resources
Pattern 2: Parallel Deployment
Users →┬→ Traditional VPN (Legacy systems)
└→ Zero Trust Access (Modern applications)
Pattern 3: Zero Trust Behind Gateway
Internet → Gateway → DMZ → Zero Trust Connectors → Internal Networks
4.2 Migration Strategies
- Phased rollout: Start with non-critical applications
- Dual-running: Operate VPN and ZTNA in parallel during transition
- Application-by-application: Migrate based on risk and readiness
- User segmentation: Pilot with technical users before broad deployment
5. Australian Government Security Frameworks
5.1 Information Security Manual (ISM)
The ISM provides a comprehensive cyber security framework that aligns with zero trust principles:
| Control ID | Description | Zero Trust Alignment |
|---|---|---|
| ISM-1654 | Multi-factor authentication | Verify explicitly |
| ISM-1655 | Privileged access management | Least privilege |
| ISM-1656 | Application control | Micro-segmentation |
Key ISM Principles for Zero Trust:
- Network segmentation: Mandatory separation of security domains
- Access control: Role-based and attribute-based policies
- Monitoring and logging: Comprehensive audit trails
- Incident response: Assume breach mentality
5.2 Protective Security Policy Framework (PSPF)
The PSPF Release 2025 mandates a "Zero Trust Culture" for Australian Government entities:
- Zero Trust Culture: Strategic commitment to ongoing verification, minimum access, and data-centric protection
- Security Domain Segmentation: Clear separation between classification levels
- Secure Access Service Edge (SSE): Adoption of cloud-delivered security (CASB, FWaaS, SWG, ZTNA)
PSPF Compliance Mapping:
| PSPF Requirement | Zero Trust Implementation |
|---|---|
| Governance | Policy-as-code, continuous compliance monitoring |
| Information Security | Encryption in transit/at rest, micro-segmentation |
| Personnel Security | Identity verification, least-privilege access |
5.3 Australian Government Gateway Security Standard 2025
The Gateway Security Standard defines requirements for securing connections between security domains:
- Zero Trust Network Access (ZTNA): Least-privilege access with dynamic authentication
- Secure Web Gateway (SWG): Content filtering and threat protection
- Cloud Access Security Broker (CASB): Visibility and control for cloud services
- Firewall-as-a-Service (FWaaS): Next-generation firewall capabilities
Compliance Considerations:
- Data sovereignty: Ensure data remains within Australian jurisdiction
- Audit logging: Comprehensive logging aligned with ISM requirements
- Encryption: Strong cryptography for all communications
5.4 Modern Defensible Architecture (MDA)
ASD's Modern Defensible Architecture (published February 2025) provides foundational guidance:
- Layered Architecture: Methodical separation of security design into distinct levels
- Zero Trust Principles: 'Never trust, always verify', 'assume breach', 'verify explicitly'
- Secure-by-Design: Security-first mindset in procurement and development
Alignment with Essential Eight:
| Essential Eight Strategy | Zero Trust Component |
|---|---|
| Application control | Device trust, application segmentation |
| Patch applications | Continuous compliance monitoring |
| Restrict admin privileges | Just-in-time access, PAM integration |
| Multi-factor authentication | Identity verification |
5.5 Vendor Considerations for Government
| Requirement | Tailscale | Twingate | Zscaler | Headscale | Pangolin | Netbird |
|---|---|---|---|---|---|---|
| Australian data residency | Partial | Partial | ✅ | ✅ | ✅ | Partial |
| IRAP certification | ❌ | ❌ | ✅ PROTECTED | Self-assessed | Self-assessed | Self-assessed |
| Open source | Partial | ❌ | ❌ | ✅ | ✅ | Open core |
| Self-hosted option | Via Headscale | ❌ | ❌ | ✅ | ✅ | ✅ |
| PSPF 2025 alignment | ✅ | ✅ | ✅ | Requires assessment | Requires assessment | Requires assessment |
6. Conclusion
Zero Trust Network Architecture represents a necessary evolution in cybersecurity, moving from perimeter-based defense to identity-centric, least-privilege access. For Australian Government entities, the alignment between zero trust principles and the PSPF 2025, ISM, and Gateway Security Standard provides a clear roadmap for implementation.
Organizations should consider:
- Commercial mesh VPN solutions (Tailscale, Twingate) for rapid deployment and excellent user experience
- IRAP-assessed platforms (Zscaler) for government compliance requirements
- Open-source alternatives (Headscale, Pangolin, Netbird) for data sovereignty and customization
- Hybrid approaches that integrate with existing gateway infrastructure
- Compliance-first implementations that meet Australian Government security requirements
The journey to zero trust is not a destination but a continuous process of verification, segmentation, and improvement.
References
Australian Government Frameworks
-
Australian Cyber Security Centre. (2025). Foundations for Modern Defensible Architecture. https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/foundations-for-modern-defensible-architecture
-
Australian Cyber Security Centre. (2024). Information Security Manual (December 2024). https://www.cyber.gov.au/sites/default/files/2024-12/Information%20Security%20Manual%20(December%202024).pdf
-
Department of Home Affairs. (2025). Protective Security Policy Framework (Release 2025). https://www.protectivesecurity.gov.au/
-
Department of Home Affairs. (2025). Australian Government Gateway Security Standard 2025. https://www.protectivesecurity.gov.au/publications-library/australian-government-gateway-security-standard-2025
Commercial Solutions
-
Tailscale. (2025). The State of Zero Trust Report 2025. https://tailscale.com/resources/report/zero-trust-report-2025
-
Twingate. (2024). What is Zero Trust Network Access? https://www.twingate.com/blog/ztna
-
Zscaler. (2024). Zscaler Completes 2024 IRAP Assessment. https://www.zscaler.com/press/zscaler-completes-2024-irap-assessment-demonstrates-enhanced-security-and-governance-maturity
Open Source Solutions
-
Font, J. et al. (2025). Headscale [GitHub]. https://github.com/juanfont/headscale
-
FOSRL. (2025). Pangolin [GitHub]. https://github.com/fosrl/pangolin
-
Netbird. (2025). Open Source Zero Trust Networking. https://netbird.io/