欢迎使用 FlowZap,快速、清晰、掌控的绘图应用。

零信任安全架构

Architecture

零信任安全架构图,展示设备态势检查、MFA 身份验证、基于风险的策略决策、短期 JWT 令牌、微分段、mTLS 加密、最小权限执行和持续监控。该模板模拟「永不信任,始终验证」的安全范式,无论网络位置如何,每个请求都经过身份验证和授权。对于在云原生环境中实施现代零信任框架的安全架构师至关重要。

完整 FlowZap 代码

User { # User / Device
n1: circle label:"Access Request"
n2: rectangle label:"Device Posture Check"
n3: rectangle label:"Identity Verification (MFA)"
n4: rectangle label:"Receive Access Decision"
n5: circle label:"Access Granted or Denied"
n1.handle(right) -> n2.handle(left)
n2.handle(right) -> n3.handle(left) [label="Device Compliant"]
n3.handle(bottom) -> PolicyEngine.n6.handle(top) [label="Authenticate"]
n4.handle(right) -> n5.handle(left)
}
PolicyEngine { # Policy Decision Point
n6: rectangle label:"Evaluate Identity Context"
n7: rectangle label:"Check Risk Score"
n8: diamond label:"Trust Level Sufficient?"
n9: rectangle label:"Issue Short-Lived Token"
n10: rectangle label:"Deny and Log"
n11: rectangle label:"Step-Up Authentication"
n6.handle(right) -> n7.handle(left) [label="Context"]
n7.handle(right) -> n8.handle(left)
n8.handle(right) -> n9.handle(left) [label="Trusted"]
n8.handle(bottom) -> n10.handle(top) [label="Denied"]
n8.handle(left) -> n11.handle(right) [label="Elevated"]
n9.handle(bottom) -> Enforcement.n12.handle(top) [label="JWT (5 min TTL)"]
n10.handle(top) -> User.n4.handle(bottom) [label="403"]
n11.handle(top) -> User.n3.handle(bottom) [label="Re-Verify"]
}
Enforcement { # Policy Enforcement Points
n12: rectangle label:"Micro-Segmentation Gateway"
n13: rectangle label:"Encrypt All Traffic (mTLS)"
n14: rectangle label:"Least-Privilege Access"
n15: rectangle label:"Continuous Monitoring"
n12.handle(right) -> n13.handle(left) [label="Segment"]
n13.handle(right) -> n14.handle(left) [label="Encrypted"]
n14.handle(bottom) -> Resources.n16.handle(top) [label="Scoped Access"]
n15.handle(top) -> PolicyEngine.n7.handle(bottom) [label="Risk Signal"]
}
Resources { # Protected Resources
n16: rectangle label:"Application Service"
n17: rectangle label:"Database"
n18: rectangle label:"API Endpoint"
n19: rectangle label:"Audit Log"
n16.handle(right) -> n17.handle(left) [label="Query"]
n16.handle(right) -> n18.handle(left) [label="Call"]
n16.handle(bottom) -> n19.handle(top) [label="Log Access"]
n16.handle(top) -> User.n4.handle(bottom) [label="Response"]
}

为什么需要这个工作流?

Traditional perimeter-based security assumes everything inside the network is trusted—a dangerous assumption when attackers can breach the perimeter or insiders can be compromised. Zero trust verifies every request regardless of network location, using device posture, identity, and risk signals to make continuous access decisions.

工作原理

  1. Step 1: The user device undergoes a posture check (OS version, encryption, compliance).
  2. Step 2: Multi-factor authentication verifies the user identity.
  3. Step 3: The policy engine evaluates identity context, risk score, and access requirements.
  4. Step 4: If trust level is sufficient, a short-lived JWT token (5-minute TTL) is issued.
  5. Step 5: Micro-segmentation and mTLS encryption protect all service-to-service communication.
  6. Step 6: Continuous monitoring feeds risk signals back to the policy engine for real-time re-evaluation.

替代方案

VPN-based perimeter security is simpler but assumes internal trust. Identity-aware proxies (BeyondCorp) implement zero trust at the network level. This template shows the complete zero trust architecture from device to resource.

Key Facts

Template Name零信任安全架构
CategoryArchitecture
Steps6 workflow steps
FormatFlowZap Code (.fz file)

相关模板

微服务服务网格架构

Architecture

服务网格架构图,展示 Istio 或 Linkerd 边车代理处理 mTLS 加密、流量策略、熔断器和跨微服务的分布式追踪。该模板可视化服务网格如何将网络关注点从应用代码中抽象出来,实现服务间的零信任通信。对于采用服务网格基础设施以提升可观测性和安全性的团队至关重要。

微服务 API 网关架构

Architecture

微服务 API 网关架构图,展示请求路由、JWT 身份验证、速率限制、服务发现以及跨分布式后端服务的响应聚合。该模板模拟微服务生态系统中所有客户端流量的入口点,在请求到达内部服务之前执行安全策略。适合设计具有集中式横切关注点的可扩展 API 基础设施的平台工程师。

微服务每服务独立数据库架构

Architecture

每服务独立数据库架构图,每个微服务拥有其专用数据存储,通过 Kafka 进行事件驱动同步以实现跨服务数据一致性。该模板展示了微服务数据隔离的核心原则,展示 PostgreSQL 和 MongoDB 如何在多语言持久化策略中共存。对于在保持最终一致性的同时强制服务自治的架构师至关重要。

按业务能力分解微服务架构

Architecture

按业务能力组织的微服务分解架构图:身份认证、产品目录、定价和订单履行,每个都有独立的数据存储和 API。该模板展示如何将单体应用拆分为与业务领域对齐的服务,使用 Backend-for-Frontend (BFF) 模式进行客户端特定的聚合。适合规划领域驱动微服务边界的架构师。

微服务绞杀者模式迁移架构

Architecture

绞杀者模式迁移架构图,展示使用路由层在新旧系统之间分流流量,逐步用新微服务替换遗留单体应用。该模板模拟经过验证的迁移策略,新功能作为微服务构建,遗留端点逐步退役。对于在不进行高风险大爆炸重写的情况下现代化遗留系统的团队至关重要。

微服务服务发现架构

Architecture

服务发现架构图,展示 Consul 或 Eureka 注册中心、客户端负载均衡、健康检查心跳以及实例的自动注册和注销。该模板可视化微服务如何在没有硬编码端点的情况下动态定位彼此,实现弹性扩展和自愈基础设施。对于构建弹性服务间通信的平台团队至关重要。

返回所有模板