var img = document.createElement('img'); img.src = "https://analytics.zks-standard.org/matomo.php?idsite=1&rec=1&url=https://zks-standard.org" + location.pathname; img.style = "border:0"; img.alt = "tracker"; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(img,s);
Skip to main content

How ZKS Compares to Other Approaches

Zero-Knowledge Sovereignty (ZKS) is complementary to existing security frameworks, not a replacement. This page clarifies the relationship between ZKS and common approaches.

ZKS vs. Zero Trust (NIST SP 800-207)

AspectZero TrustZKS
Primary Question"Who can access this resource?""Who can decrypt this data?"
Trust ModelNever trust, always verifyNever rely on policy; verify capability
FocusNetwork perimeter, identity, accessCryptographic control, topology, sovereignty
Threat ModelAssumes breach; limits lateral movementAssumes provider compromise; ensures decryptability control

Relationship: Complementary. A ZKS-compliant system can (and should) also implement Zero Trust principles. ZT controls access to the system; ZKS controls decryptability of the data. For detailed analysis, see ZKS vs. Zero Trust Architecture.


ZKS vs. BYOK / HYOK / DKE

ApproachDescriptionZKS Assessment
BYOK (Bring Your Own Key)Customer provides key; provider uses itOften non-compliant - provider holds key during use
HYOK (Hold Your Own Key)Customer retains key; provider requests on-demandDepends on implementation - key release may grant provider access
DKE (Double Key Encryption)Two keys required; customer holds oneCan be compliant if customer key never reaches provider

The Problem: "Customer-managed keys" often means the provider still possesses the key during processing. ZKS requires that the provider cannot access or derive decryptability - not even temporarily. This requirement is formalized in A2: providers must not possess the cryptographic components required to decrypt.


ZKS vs. End-to-End Encryption (E2EE)

AspectE2E EncryptionZKS
ScopeTransport/storage encryptionFull sovereignty (encryption + topology + control + metadata)
Key ManagementOften unspecifiedExplicit requirements for key plane separation
MetadataOften exposedMinimization required (A7)
RevocationVariesUser must retain unilateral control (A4)
Provider RoleMay hold ciphertextMust be cryptographically blind

Relationship: E2EE is necessary but not sufficient for ZKS compliance. A system can have E2EE and still fail ZKS if the provider can revoke decryptability, access metadata, or hold keys.


ZKS vs. Confidential Computing (CC)

AspectConfidential ComputingZKS
ProtectionData in use (processing)Data at rest, in transit, and sovereignty
MechanismHardware enclaves (SGX, SEV, TDX)Architectural topology, key separation
Trust ModelTrust hardware attestationTrust capability constraints
Provider AccessEncrypted during processingNever - provider is cryptographically blind

Relationship: Defense in depth. CC can protect data during processing within a ZKS architecture. However, CC alone doesn't address key management, metadata exposure, or revocation control. ZKS defines "Extended CSD" for scenarios where remote TEEs participate in the Client Sovereignty Domain with explicit attestation requirements.


ZKS vs. "Zero-Knowledge" Marketing Claims

Many products claim "zero-knowledge" without meeting ZKS requirements:

ClaimRealityZKS Position
"We can't see your data"Often policy-based, not capability-basedMust be technically incapable of accessing data, not just policy-prohibited
"End-to-end encrypted"Keys may still be provider-accessibleProvider must be cryptographically blind
"Customer-managed keys"Key may be exposed during useProvider must never access key material
"We don't store your password"Password may derive keys server-sideKey derivation must occur within CSD only

The ZKS Test: Can the provider access or derive the complete set of components required to decrypt? If yes - regardless of marketing claims - they are not ZKS-compliant.


Summary Matrix

FrameworkAccess ControlDecryptability ControlTopology ControlMetadata Protection
Zero TrustPrimary focusNot addressedNot addressedPartial
BYOK/HYOKNot addressedPartialNot addressedNot addressed
E2E EncryptionNot addressedPartialNot addressedNot addressed
Confidential ComputingPartialDuring processingNot addressedPartial
ZKSOut of scopePrimary focusRequiredRequired

Conclusion: ZKS addresses a specific gap - decryptability control - that other frameworks do not fully cover. For comprehensive security, combine ZKS with Zero Trust, Confidential Computing, and robust access controls.