零信任安全架构
Architecture
零信任安全架构图,展示设备态势检查、MFA 身份验证、基于风险的策略决策、短期 JWT 令牌、微分段、mTLS 加密、最小权限执行和持续监控。该模板模拟「永不信任,始终验证」的安全范式,无论网络位置如何,每个请求都经过身份验证和授权。对于在云原生环境中实施现代零信任框架的安全架构师至关重要。
完整 FlowZap 代码
User { # User / Device
n1: circle label:"Access Request"
n2: rectangle label:"Device Posture Check"
n3: rectangle label:"Identity Verification (MFA)"
n4: rectangle label:"Receive Access Decision"
n5: circle label:"Access Granted or Denied"
n1.handle(right) -> n2.handle(left)
n2.handle(right) -> n3.handle(left) [label="Device Compliant"]
n3.handle(bottom) -> PolicyEngine.n6.handle(top) [label="Authenticate"]
n4.handle(right) -> n5.handle(left)
}
PolicyEngine { # Policy Decision Point
n6: rectangle label:"Evaluate Identity Context"
n7: rectangle label:"Check Risk Score"
n8: diamond label:"Trust Level Sufficient?"
n9: rectangle label:"Issue Short-Lived Token"
n10: rectangle label:"Deny and Log"
n11: rectangle label:"Step-Up Authentication"
n6.handle(right) -> n7.handle(left) [label="Context"]
n7.handle(right) -> n8.handle(left)
n8.handle(right) -> n9.handle(left) [label="Trusted"]
n8.handle(bottom) -> n10.handle(top) [label="Denied"]
n8.handle(left) -> n11.handle(right) [label="Elevated"]
n9.handle(bottom) -> Enforcement.n12.handle(top) [label="JWT (5 min TTL)"]
n10.handle(top) -> User.n4.handle(bottom) [label="403"]
n11.handle(top) -> User.n3.handle(bottom) [label="Re-Verify"]
}
Enforcement { # Policy Enforcement Points
n12: rectangle label:"Micro-Segmentation Gateway"
n13: rectangle label:"Encrypt All Traffic (mTLS)"
n14: rectangle label:"Least-Privilege Access"
n15: rectangle label:"Continuous Monitoring"
n12.handle(right) -> n13.handle(left) [label="Segment"]
n13.handle(right) -> n14.handle(left) [label="Encrypted"]
n14.handle(bottom) -> Resources.n16.handle(top) [label="Scoped Access"]
n15.handle(top) -> PolicyEngine.n7.handle(bottom) [label="Risk Signal"]
}
Resources { # Protected Resources
n16: rectangle label:"Application Service"
n17: rectangle label:"Database"
n18: rectangle label:"API Endpoint"
n19: rectangle label:"Audit Log"
n16.handle(right) -> n17.handle(left) [label="Query"]
n16.handle(right) -> n18.handle(left) [label="Call"]
n16.handle(bottom) -> n19.handle(top) [label="Log Access"]
n16.handle(top) -> User.n4.handle(bottom) [label="Response"]
}
为什么需要这个工作流?
Traditional perimeter-based security assumes everything inside the network is trusted—a dangerous assumption when attackers can breach the perimeter or insiders can be compromised. Zero trust verifies every request regardless of network location, using device posture, identity, and risk signals to make continuous access decisions.
工作原理
- Step 1: The user device undergoes a posture check (OS version, encryption, compliance).
- Step 2: Multi-factor authentication verifies the user identity.
- Step 3: The policy engine evaluates identity context, risk score, and access requirements.
- Step 4: If trust level is sufficient, a short-lived JWT token (5-minute TTL) is issued.
- Step 5: Micro-segmentation and mTLS encryption protect all service-to-service communication.
- Step 6: Continuous monitoring feeds risk signals back to the policy engine for real-time re-evaluation.
替代方案
VPN-based perimeter security is simpler but assumes internal trust. Identity-aware proxies (BeyondCorp) implement zero trust at the network level. This template shows the complete zero trust architecture from device to resource.
Key Facts
| Template Name | 零信任安全架构 |
| Category | Architecture |
| Steps | 6 workflow steps |
| Format | FlowZap Code (.fz file) |
相关模板
微服务 API 网关架构
Architecture
微服务 API 网关架构图,展示请求路由、JWT 身份验证、速率限制、服务发现以及跨分布式后端服务的响应聚合。该模板模拟微服务生态系统中所有客户端流量的入口点,在请求到达内部服务之前执行安全策略。适合设计具有集中式横切关注点的可扩展 API 基础设施的平台工程师。
微服务每服务独立数据库架构
Architecture
每服务独立数据库架构图,每个微服务拥有其专用数据存储,通过 Kafka 进行事件驱动同步以实现跨服务数据一致性。该模板展示了微服务数据隔离的核心原则,展示 PostgreSQL 和 MongoDB 如何在多语言持久化策略中共存。对于在保持最终一致性的同时强制服务自治的架构师至关重要。
按业务能力分解微服务架构
Architecture
按业务能力组织的微服务分解架构图:身份认证、产品目录、定价和订单履行,每个都有独立的数据存储和 API。该模板展示如何将单体应用拆分为与业务领域对齐的服务,使用 Backend-for-Frontend (BFF) 模式进行客户端特定的聚合。适合规划领域驱动微服务边界的架构师。
微服务绞杀者模式迁移架构
Architecture
绞杀者模式迁移架构图,展示使用路由层在新旧系统之间分流流量,逐步用新微服务替换遗留单体应用。该模板模拟经过验证的迁移策略,新功能作为微服务构建,遗留端点逐步退役。对于在不进行高风险大爆炸重写的情况下现代化遗留系统的团队至关重要。