概要
This skill provides a comprehensive framework for designing and implementing security architectures that eliminate implicit trust. It guides users through the core pillars of Zero Trust—never trust always verify, least privilege, and assume breach—while offering detailed implementation patterns for identity-aware proxies, service meshes, and microsegmentation. Whether you are migrating from a perimeter-based security model or building a cloud-native application, this skill helps you enforce strict access controls across identity, device, network, and data layers to minimize attack surfaces and lateral movement.