Under active development Content is continuously updated and improved

Zscaler Zero Trust Exchange

by Zscaler, Inc.

Cloud-native zero trust network security platform for secure internet access (ZIA) and private access (ZPA)

Official Docs

Under Construction: This guidance is being actively developed and verified. Content may change.

Authoritative Sources

Key guidance documents from authoritative organizations. Click to view the original source.

NIST SP 800-207 §2: "Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location." §2.1 Tenet 1: "All data sources and computing services are considered resources." Tenet 2: "All communication is secured regardless of network location." Tenet 6: "All resource authentication and authorization are dynamic and strictly enforced before access is allowed." Zscaler ZPA implements these tenets through identity-based micro-segmentation and continuous verification.

Configuration Examples(1)

·

Best practices for ZPA deployment including App Connector high availability, segmentation strategies, business-critical app policies, and SIEM integration.

Configuration Examples(6)

·

NIST SP 800-207 Abstract: "Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location... Zero trust focuses on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource." §2.1: "Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established." Zscaler implements core ZTA principles through identity-based access controls.

Federal zero trust guidance aligned with EO 14028. Zscaler supports CISA maturity pillars: identity, devices, networks, applications, and data.

CIS Control 12 requires secure network infrastructure. Zscaler provides cloud-based segmentation and access control without traditional VPNs.

Zscaler recommends: "A well-configured policy restricts or permits web content access without disrupting the end users or their experience." URL Filtering, Cloud App Control, File Type Control, and Firewall policies should follow Global > Specific > Global pattern. Block QUIC to force HTTP/2 for full inspection.

Configuration Examples(3)

·

SOC 2 CC6.6: "The entity implements logical access security measures to protect against threats from sources outside its system boundaries." Zscaler Zero Trust Exchange eliminates the network perimeter by enforcing identity-based access policies, providing comprehensive boundary protection through cloud-native security controls that directly implement CC6.6 requirements. Source: AICPA Trust Services Criteria.

ISO 27001:2022 A.8.20: "Networks and network devices shall be secured, managed and controlled to protect information in systems and applications." Zscaler provides secure network connectivity through its cloud-native Zero Trust Exchange, implementing network security controls including encrypted tunnels, identity-based segmentation, and continuous monitoring as required by A.8.20. Source: ISO/IEC 27001:2022 Annex A.

CCM IVS-09: "Configure network segmentation to isolate sensitive data and systems." CCM IVS-06: "Implement cryptographic mechanisms to protect the confidentiality and integrity of data traversing public networks." Zscaler implements micro-segmentation through application-level access policies and encrypts all traffic through its Zero Trust Exchange, directly supporting CCM IVS controls for network security. Source: CSA Cloud Controls Matrix v4.0.

Verification Commands

Commands and queries for testing and verifying security configurations.

List App Connector groups API
GET /mgmtconfig/v1/admin/customers/{customerId}/appConnectorGroup
Get application segments API
GET /mgmtconfig/v1/admin/customers/{customerId}/application
List access policies API
GET /mgmtconfig/v1/admin/customers/{customerId}/policySet/rules
Check connector health API
GET /mgmtconfig/v1/admin/customers/{customerId}/connector
Get user activity logs API
POST /api/v1/userActivity { "startTime": "2024-01-01T00:00:00Z" }
List server groups API
GET /mgmtconfig/v1/admin/customers/{customerId}/serverGroup
Get posture profiles API
GET /mgmtconfig/v2/admin/customers/{customerId}/posture
List SAML IdP configurations API
GET /mgmtconfig/v1/admin/customers/{customerId}/idp
Get segment groups API
GET /mgmtconfig/v1/admin/customers/{customerId}/segmentGroup

Related Controls

Security controls from various frameworks that relate to Zscaler Zero Trust Exchange.

Related Technologies