Zero Trust Architecture Lab
Overview
This hands-on lab will help you implement a small-scale Zero Trust Architecture (ZTA) using open-source tools. Youโll simulate secure access control, segmentation, and monitoring between multiple internal services.
Lab Instructions
1. Lab Setup: Tools and Environment
You will need:
- pfSense (in a VM or installed on Proxmox/VirtualBox)
- Docker and Docker Compose
- OpenVPN or WireGuard for identity-based remote access
- Optional: Suricata or Snort for traffic monitoring
Network Design:
- Segment A: Trusted Users (e.g., Admin Workstation)
- Segment B: Internal Web App (Docker container)
- Segment C: Sensitive Service (Database container)
- All traffic flows controlled via pfSense firewall rules
2. Build the Network Segments in Docker
Create an isolated Docker network and simulate services:
version: '3'
services:
webapp:
image: httpd
networks:
- segment_b
db:
image: mariadb
environment:
MYSQL_ROOT_PASSWORD: secret
networks:
- segment_c
networks:
segment_b:
segment_c:
3. Configure pfSense for Zero Trust Principles
- Create VLANs or virtual interfaces for each segment
- Apply firewall rules:
- Deny all traffic by default
- Allow webapp-to-db access only from approved source
- Require VPN tunnel for administrative access
- Set up Suricata for East-West traffic inspection
4. Identity-Based Remote Access with VPN
- Install and configure OpenVPN or WireGuard on pfSense
- Create user accounts with unique certs or keys
- Test secure access to services from a remote device via VPN
๐ Checkpoint: Can the user access only the permitted service? Can lateral movement occur?
5. Simulate an Insider Threat or Breach Attempt
- Attempt to access the database from a container in segment B
- Verify that pfSense blocks unauthorized East-West traffic
- Use Suricata or firewall logs to detect and analyze the attempt
6. Just-in-Time Access & Auditing (Optional Challenge)
- Set up temporary firewall rules triggered by authenticated sessions
- Log access windows and automate rule expiry
- Capture logs for later analysis and auditing
Final Submission
Submit a short report including:
- Network diagram of your Zero Trust layout
- Screenshots of pfSense firewall rules and VPN configuration
- Documentation of traffic flow enforcement and detection
- Reflection: How does Zero Trust differ from traditional perimeter models?
๐ Great work! Youโve just built a Zero Trust lab using real tools! ๐