Beyond the Perimeter: A Practical Guide to Zero Trust Networking Source
Markdown source
1---2title: "Beyond the Perimeter: A Practical Guide to Zero Trust Networking"3date: "2026-03-29"4tags: ["zero-trust", "network-security", "ztna", "tailscale", "twingate", "zscaler", "headscale", "pangolin", "netbird", "ism", "pspf", "australian-government"]5author: "Gavin Jackson"6excerpt: "A practical guide to Zero Trust Network Architecture covering commercial solutions (Tailscale, Twingate), IRAP-assessed options for government (Zscaler), and open-source alternatives (Headscale, Pangolin, Netbird). Includes alignment with Australian Government security frameworks."7---89# Beyond the Perimeter: A Practical Guide to Zero Trust Networking1011**Table of Contents**12- [1. Introduction to Zero Trust Concepts](#1-introduction-to-zero-trust-concepts)13- [2. Commercial Solutions](#2-commercial-solutions)14 - [Tailscale](#21-tailscale)15 - [Twingate](#22-twingate)16 - [IRAP-Assessed Options](#23-irap-assessed-options-for-australian-government)17- [3. Open Source Alternatives](#3-open-source-alternatives)18 - [Headscale](#31-headscale)19 - [Pangolin](#32-pangolin)20 - [Netbird](#33-netbird)21- [4. Gateway Integration](#4-integration-with-traditional-gateway-environments)22- [5. Australian Government Frameworks](#5-australian-government-security-frameworks)23- [6. Conclusion](#6-conclusion)24- [References](#references)2526---2728## 1. Introduction to Zero Trust Concepts2930### 1.1 The Problem with Traditional Perimeter Security3132Traditional network security operates on a "hard crunchy outside, soft chewy inside" model—once an attacker breaches the perimeter, they often have broad access to internal resources. This approach is increasingly inadequate because:3334- **Perimeter erosion**: Cloud services, remote work, and mobile devices dissolve the traditional network boundary35- **Lateral movement**: Attackers who breach the perimeter can move freely within the network36- **Implicit trust**: Internal traffic is often trusted by default, enabling privilege escalation37- **VPN limitations**: Traditional VPNs provide broad network access rather than resource-specific authorization3839### 1.2 Core Zero Trust Principles4041Zero Trust is built on three foundational principles:42431. **Never Trust, Always Verify**: No user, device, or application is trusted by default, regardless of location442. **Assume Breach**: Design systems as if an attacker is already present; contain blast radius through segmentation453. **Verify Explicitly**: Authenticate and authorize every access request based on all available data points4647### 1.3 Key Architectural Components4849| Component | Description |50|-----------|-------------|51| **Identity Provider (IdP)** | Centralized authentication and authorization (SSO, MFA) |52| **Device Posture** | Continuous assessment of device health and compliance |53| **Policy Engine** | Real-time evaluation of access requests against defined policies |54| **Micro-segmentation** | Network isolation at the resource level rather than subnet level |55| **Continuous Monitoring** | Ongoing verification and logging of all access attempts |5657### 1.4 Security Challenges Addressed5859Zero Trust architectures directly address:6061- **Insider threats**: Least-privilege access limits damage from compromised credentials62- **Ransomware propagation**: Micro-segmentation prevents lateral movement63- **Shadow IT**: Identity-aware access controls bring unmanaged resources under governance64- **Third-party access**: Granular permissions for contractors and partners without network-level access65- **Remote work security**: Consistent security posture regardless of user location6667---6869## 2. Commercial Solutions7071### 2.1 Tailscale7273**Overview**: Tailscale is a mesh VPN built on WireGuard that creates secure, peer-to-peer connections between devices.7475**Key Features**:76- **Mesh architecture**: Direct device-to-device connections without central traffic routing77- **Identity-based networking**: Integrates with Okta, Google Workspace, Microsoft Entra ID78- **NAT traversal**: Uses DERP relays when direct connections aren't possible79- **Access Control Lists (ACLs)**: Fine-grained, JSON-based policies80- **MagicDNS**: Automatic DNS resolution for connected devices81- **Subnet routing**: Access entire networks through exit nodes8283**Architecture**:84```85Devices ←→ Tailscale Client (WireGuard) ←→ Coordination Server86 ↓ ↓87 DERP Relays (fallback) ACLs & Policies88```8990**Best for**: Remote teams, cross-cloud connectivity, IoT device management9192---9394### 2.2 Twingate9596**Overview**: Twingate provides Zero Trust Network Access (ZTNA) that replaces traditional VPNs with identity-aware, least-privilege access.9798**Key Features**:99- **Split tunneling by default**: Only routes traffic to protected resources100- **Resource-level access**: Define access per application, not per network101- **Zero trust segmentation**: Micro-segmentation without network reconfiguration102- **Device trust**: Continuous device posture assessment103- **No open ports**: Resources remain invisible to the public internet104105**Advantages over Traditional VPN**:106107| Aspect | Traditional VPN | Twingate ZTNA |108|--------|-----------------|---------------|109| Network access | Full subnet access | Resource-specific |110| Attack surface | Public gateway | No exposed ports |111| User experience | All traffic routed | Split tunneling |112| Onboarding | Complex | Automated |113| Visibility | Limited | Full audit trails |114115**Best for**: Organizations wanting to replace VPNs with modern ZTNA116117---118119### 2.3 Sidebar: IRAP-Assessed Options for Australian Government120121For Australian Government entities requiring certified solutions, **Zscaler** offers the only IRAP-assessed zero trust platform at the PROTECTED level.122123**Zscaler Zero Trust Exchange™**124125- **IRAP PROTECTED** certified (2024 assessment)126- First cloud security/zero trust vendor to complete IRAP127- Comprehensive SASE platform (ZTNA, SWG, CASB, DLP)128- Australian Points of Presence for data sovereignty129130**When to Consider Zscaler**:131- Government agencies requiring IRAP certification132- Organizations needing comprehensive SASE architecture133- Multi-cloud environments requiring unified policy enforcement134135**Trade-offs**: Higher cost and complexity compared to Tailscale/Twingate; full SASE platform may be overkill for smaller organizations.136137---138139## 3. Open Source Alternatives140141### 3.1 Headscale142143**Overview**: Headscale is an open-source, self-hosted implementation of the Tailscale control server.144145**Key Features**:146- **Full Tailscale compatibility**: Works with official Tailscale clients147- **Self-hosted control plane**: Complete data sovereignty148- **Namespace-based ACLs**: User and group access controls149- **OIDC integration**: Support for external identity providers150151**Architecture**:152```153Tailscale Clients → Headscale Server (Self-hosted)154 ↓155 SQLite/PostgreSQL Database156 ↓157 DERP Relays (Self-hosted or public)158```159160**Best for**: Organizations requiring complete control over control plane data161162---163164### 3.2 Pangolin165166**Overview**: Pangolin is an open-source, identity-aware remote access platform built on WireGuard that combines reverse proxy and VPN capabilities.167168**Key Features**:169- **Dual access modes**: Browser-based access for web apps, WireGuard VPN for network resources170- **Identity integration**: Connects to OIDC and OAuth2 providers171- **Site connectors**: Deploy connectors to extend access to any network172- **Self-hosted**: Complete control over infrastructure and data173174**Comparison with Commercial Solutions**:175176| Feature | Pangolin | Twingate | Tailscale |177|---------|----------|----------|-----------|178| Open Source | ✅ | ❌ | Partial |179| Self-hosted | ✅ | ❌ | Via Headscale |180| WireGuard-based | ✅ | ✅ | ✅ |181| Web + VPN access | ✅ | ✅ | VPN only |182| Enterprise support | Community | Commercial | Commercial |183184**Best for**: Organizations wanting open-source Twingate alternative with web + VPN access185186---187188### 3.3 Netbird189190**Overview**: Netbird is an open-core zero trust networking platform built on WireGuard, offering both self-hosted and managed cloud options.191192**Key Features**:193- **WireGuard-based**: Modern cryptography with excellent performance194- **Open core model**: Free self-hosted version with paid cloud offering195- **Identity integration**: Native OIDC support (Entra ID, Okta, Google)196- **Device posture**: Integration with Microsoft Defender and other EDR solutions197- **Mesh networking**: Direct peer-to-peer connections with relay fallback198199**Comparison with Headscale**:200201| Feature | Netbird | Headscale |202|---------|---------|-----------|203| Protocol | WireGuard | WireGuard (via Tailscale) |204| Client | Netbird-specific | Tailscale official |205| Device posture | Native EDR integration | Via ACLs |206| Deployment | Self-hosted or cloud | Self-hosted only |207208**Best for**: Teams wanting WireGuard without Tailscale dependency; organizations requiring built-in device trust209210---211212## 4. Integration with Traditional Gateway Environments213214### 4.1 Hybrid Architecture Patterns215216**Pattern 1: Gateway as Policy Enforcement Point**217```218Internet → Gateway (Firewall/IPS) → Zero Trust Layer → Internal Resources219```220221**Pattern 2: Parallel Deployment**222```223Users →┬→ Traditional VPN (Legacy systems)224 └→ Zero Trust Access (Modern applications)225```226227**Pattern 3: Zero Trust Behind Gateway**228```229Internet → Gateway → DMZ → Zero Trust Connectors → Internal Networks230```231232### 4.2 Migration Strategies2332341. **Phased rollout**: Start with non-critical applications2352. **Dual-running**: Operate VPN and ZTNA in parallel during transition2363. **Application-by-application**: Migrate based on risk and readiness2374. **User segmentation**: Pilot with technical users before broad deployment238239---240241## 5. Australian Government Security Frameworks242243### 5.1 Information Security Manual (ISM)244245The ISM provides a comprehensive cyber security framework that aligns with zero trust principles:246247| Control ID | Description | Zero Trust Alignment |248|------------|-------------|---------------------|249| ISM-1654 | Multi-factor authentication | Verify explicitly |250| ISM-1655 | Privileged access management | Least privilege |251| ISM-1656 | Application control | Micro-segmentation |252253**Key ISM Principles for Zero Trust**:254- Network segmentation: Mandatory separation of security domains255- Access control: Role-based and attribute-based policies256- Monitoring and logging: Comprehensive audit trails257- Incident response: Assume breach mentality258259---260261### 5.2 Protective Security Policy Framework (PSPF)262263The PSPF Release 2025 mandates a "Zero Trust Culture" for Australian Government entities:2642651. **Zero Trust Culture**: Strategic commitment to ongoing verification, minimum access, and data-centric protection2662. **Security Domain Segmentation**: Clear separation between classification levels2673. **Secure Access Service Edge (SSE)**: Adoption of cloud-delivered security (CASB, FWaaS, SWG, ZTNA)268269**PSPF Compliance Mapping**:270271| PSPF Requirement | Zero Trust Implementation |272|------------------|---------------------------|273| Governance | Policy-as-code, continuous compliance monitoring |274| Information Security | Encryption in transit/at rest, micro-segmentation |275| Personnel Security | Identity verification, least-privilege access |276277---278279### 5.3 Australian Government Gateway Security Standard 2025280281The Gateway Security Standard defines requirements for securing connections between security domains:2822831. **Zero Trust Network Access (ZTNA)**: Least-privilege access with dynamic authentication2842. **Secure Web Gateway (SWG)**: Content filtering and threat protection2853. **Cloud Access Security Broker (CASB)**: Visibility and control for cloud services2864. **Firewall-as-a-Service (FWaaS)**: Next-generation firewall capabilities287288**Compliance Considerations**:289- **Data sovereignty**: Ensure data remains within Australian jurisdiction290- **Audit logging**: Comprehensive logging aligned with ISM requirements291- **Encryption**: Strong cryptography for all communications292293---294295### 5.4 Modern Defensible Architecture (MDA)296297ASD's Modern Defensible Architecture (published February 2025) provides foundational guidance:2982991. **Layered Architecture**: Methodical separation of security design into distinct levels3002. **Zero Trust Principles**: 'Never trust, always verify', 'assume breach', 'verify explicitly'3013. **Secure-by-Design**: Security-first mindset in procurement and development302303**Alignment with Essential Eight**:304305| Essential Eight Strategy | Zero Trust Component |306|--------------------------|---------------------|307| Application control | Device trust, application segmentation |308| Patch applications | Continuous compliance monitoring |309| Restrict admin privileges | Just-in-time access, PAM integration |310| Multi-factor authentication | Identity verification |311312---313314### 5.5 Vendor Considerations for Government315316| Requirement | Tailscale | Twingate | Zscaler | Headscale | Pangolin | Netbird |317|-------------|-----------|----------|---------|-----------|----------|---------|318| Australian data residency | Partial | Partial | ✅ | ✅ | ✅ | Partial |319| IRAP certification | ❌ | ❌ | ✅ PROTECTED | Self-assessed | Self-assessed | Self-assessed |320| Open source | Partial | ❌ | ❌ | ✅ | ✅ | Open core |321| Self-hosted option | Via Headscale | ❌ | ❌ | ✅ | ✅ | ✅ |322| PSPF 2025 alignment | ✅ | ✅ | ✅ | Requires assessment | Requires assessment | Requires assessment |323324---325326## 6. Conclusion327328Zero Trust Network Architecture represents a necessary evolution in cybersecurity, moving from perimeter-based defense to identity-centric, least-privilege access. For Australian Government entities, the alignment between zero trust principles and the PSPF 2025, ISM, and Gateway Security Standard provides a clear roadmap for implementation.329330Organizations should consider:3313321. **Commercial mesh VPN solutions** (Tailscale, Twingate) for rapid deployment and excellent user experience3332. **IRAP-assessed platforms** (Zscaler) for government compliance requirements3343. **Open-source alternatives** (Headscale, Pangolin, Netbird) for data sovereignty and customization3354. **Hybrid approaches** that integrate with existing gateway infrastructure3365. **Compliance-first** implementations that meet Australian Government security requirements337338The journey to zero trust is not a destination but a continuous process of verification, segmentation, and improvement.339340---341342## References343344### Australian Government Frameworks3453461. Australian Cyber Security Centre. (2025). *Foundations for Modern Defensible Architecture*. https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/foundations-for-modern-defensible-architecture3473482. Australian Cyber Security Centre. (2024). *Information Security Manual* (December 2024). https://www.cyber.gov.au/sites/default/files/2024-12/Information%20Security%20Manual%20(December%202024).pdf3493503. Department of Home Affairs. (2025). *Protective Security Policy Framework* (Release 2025). https://www.protectivesecurity.gov.au/3513524. Department of Home Affairs. (2025). *Australian Government Gateway Security Standard 2025*. https://www.protectivesecurity.gov.au/publications-library/australian-government-gateway-security-standard-2025353354### Commercial Solutions3553565. Tailscale. (2025). *The State of Zero Trust Report 2025*. https://tailscale.com/resources/report/zero-trust-report-20253573586. Twingate. (2024). *What is Zero Trust Network Access?* https://www.twingate.com/blog/ztna3593607. Zscaler. (2024). *Zscaler Completes 2024 IRAP Assessment*. https://www.zscaler.com/press/zscaler-completes-2024-irap-assessment-demonstrates-enhanced-security-and-governance-maturity361362### Open Source Solutions3633648. Font, J. et al. (2025). *Headscale* [GitHub]. https://github.com/juanfont/headscale3653669. FOSRL. (2025). *Pangolin* [GitHub]. https://github.com/fosrl/pangolin36736810. Netbird. (2025). *Open Source Zero Trust Networking*. https://netbird.io/369