var img = document.createElement('img'); img.src = "https://analytics.zks-standard.org/matomo.php?idsite=1&rec=1&url=https://zks-standard.org" + location.pathname; img.style = "border:0"; img.alt = "tracker"; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(img,s);
Skip to main content
Version: 1.0-RC1 / CANDIDATE STANDARD

ZKS vs. Zero Trust Architecture

How Zero-Knowledge Sovereignty Complements NIST SP 800-207

Version: 1.2 Status: Position Paper Audience: Security Architects, CISOs, Compliance Officers


Executive Summary

Zero Trust Architecture (ZTA) and Zero-Knowledge Sovereignty (ZKS) address different but complementary security concerns:

FrameworkPrimary QuestionControl Mechanism
Zero Trust"Who is allowed to access this resource?"Policy & Identity
ZKS"Where do the cryptographic components exist?"Topology & Architecture

Key insight: Zero Trust controls access through policy enforcement. ZKS controls topology - ensuring data and key components never coexist under external control. A system can be fully Zero Trust compliant while completely failing ZKS. The frameworks are complementary: Zero Trust protects against unauthorized access; ZKS makes the question of provider trust architecturally irrelevant.


The Fundamental Distinction

Zero Trust: Policy-Based Access Control

Zero Trust operates on the principle "never trust, always verify." Every access request is authenticated, authorized, and continuously validated. But critically, Zero Trust still assumes someone can access the resource - it just controls who.

ZKS: Topology-Based Component Separation

ZKS operates on a different principle: "Make trust irrelevant by separating components." Rather than controlling who can access data, ZKS ensures that the components required for decryption never coexist under external control. The question isn't "do we trust the provider?" - it's "does the topology make that question moot?"

AspectZero TrustZKS
Core Question"Who can access?""Where do components exist?"
Control MechanismPolicy enforcementTopological separation
Trust ModelVerify every requestMake trust irrelevant
Failure ModePolicy failure → data exposedPolicy failure → data still undecryptable
Privacy TypeBehavioral (enforcement-based)Structural (architectural)

Three Types of Privacy

Understanding ZKS requires distinguishing three fundamentally different approaches to privacy:

1. Behavioral Privacy (Weakest)

"The provider promises not to access your data."

  • Based on policy, contracts, Data Processing Agreements (DPAs)
  • Depends on provider behavior
  • Verification: Trust their word, audit compliance
  • Failure: Policy violation, insider threat, acquisition

Example: "Our employees sign NDAs and cannot access customer data."

2. Capability Privacy (Stronger)

"The provider cannot decrypt your data."

  • Based on cryptographic controls
  • Depends on current cryptographic strength
  • Verification: Analyze cryptographic protocols
  • Failure: Cryptographic advances, implementation flaws, coercion to attempt decryption

Example: "We use AES-256 encryption; decryption is mathematically infeasible."

3. Structural Privacy (Strongest - ZKS)

"The provider never holds the components that would make decryption a question."

  • Based on architectural topology
  • Depends on where components physically/logically exist
  • Verification: Examine an architecture diagram
  • Failure: Only if topology itself is compromised

Example: "Data Plane and Key Plane are operated by different parties; no single party holds both."

The ZKS Innovation: Privacy becomes a property of the topology, not of provider behavior or cryptographic difficulty. You can verify structural privacy by looking at a diagram - it's auditable like "load-bearing capacity" in a building, not dependent on promises or mathematical hardness.


Zero Trust Architecture Overview

Core Principles (NIST SP 800-207)

  1. No implicit trust - All access requests are authenticated and authorized
  2. Least privilege - Users receive minimum necessary access
  3. Assume breach - Design as if the network is already compromised
  4. Continuous verification - Trust is reassessed continuously

What Zero Trust Controls

DomainZero Trust Approach
NetworkMicro-segmentation, no trusted zones
IdentityStrong authentication, continuous verification
DevicesDevice health verification, posture assessment
ApplicationsApplication-level access control
DataClassification, access logging, policy enforcement

What Zero Trust Does NOT Control

Zero Trust focuses on who can reach resources. It does not inherently address:

  • Topology - Where cryptographic components physically exist
  • Coexistence - Whether data and keys reside under the same control
  • Structural separation - Whether planes are architecturally isolated
  • Compulsion resistance - What happens when the controller must comply

A provider with perfect Zero Trust implementation can still:

  • Hold both ciphertext and key material
  • Be compelled to combine them under legal pressure
  • Accumulate components for future decryption ("harvest now, decrypt later")

Zero-Knowledge Sovereignty Overview

Core Principles (ZKS-1.0)

  1. Topological separation - Data and key components never coexist under external control
  2. Structural privacy - Privacy is an architectural property, not a policy
  3. Trust irrelevance - The architecture makes provider trustworthiness moot
  4. Possession over capability - The test is what they hold, not what they can do

What ZKS Controls

DomainZKS Approach
TopologyStrict separation of Data Plane and Key Plane
Component locationNo coexistence under single external control
Structural privacyPrivacy verifiable from architecture diagram
Compulsion resistanceNothing to compel if components don't coexist

The Topological Requirement

ZKS doesn't just ask "can they decrypt?" - it asks "do they hold the components that would make that question relevant?"

Logical Component Model & Sovereignty Boundary

Trust Replacement vs. Trust Verification

The Zero Trust Approach to Trust

Zero Trust doesn't eliminate trust - it continuously verifies trust. Every access request is a trust decision. The system constantly asks: "Should I trust this identity, this device, this request?"

This is valuable, but it still operates within a trust paradigm. Someone, somewhere, is trusted to make the access decision.

The ZKS Approach to Trust

ZKS makes trust architecturally irrelevant. By ensuring components never coexist under external control, there's nothing to trust the provider with.

AspectZero TrustZKS
Trust statusContinuously verifiedArchitecturally irrelevant
Provider roleTrusted to enforce policyHas nothing to be trusted with
Failure requiresPolicy/enforcement failureTopology compromise
Audit question"Are policies being followed?""Are components separated?"

The Difference:

  • Zero Trust: "We verify the provider is trustworthy"
  • ZKS: "The architecture makes provider trustworthiness irrelevant"

This is why ZKS is immune to arguments like:

  • "But they're ISO 27001 certified!" (Certification verifies policy, not topology)
  • “They have a Data Processing Agreement (DPA)!” (A DPA is a contractual, behavioral control, not a structural or architectural guarantee.)
  • "Their admins can't access data!" (Policy can fail; topology cannot be violated by policy failure)

The Subpoena Test: Possession vs. Capability

The "Subpoena Test" is often framed as: "Can the provider comply with a decryption demand?"

ZKS reframes this as a Possession Test: "Does the provider hold the components that would make compliance a question?"

Traditional Framing (Capability)

Court: "Decrypt this user's data."

Provider analysis: Do we have the ciphertext? → Yes Do we have the keys? → Yes (wrapped) Can we unwrap the keys? → Currently no Result: "We cannot comply" (but components coexist)

Problem:

  • Court may order provider to engineer a solution
  • Future cryptographic advances may enable unwrapping
  • Coercion can compel attempts
  • "Cannot" becomes "not yet" or "not easily"

ZKS Framing (Possession/Topology)

Court: "Decrypt this user's data."

Provider analysis: Do we hold ciphertext? → Yes/No Do we hold key material? → Yes/No Do both coexist under our control? → NO Result: "We possess only [one component]; we cannot comply because we do not hold the other component."

Advantage:

  • No amount of engineering can produce missing components
  • Coercion cannot compel production of non-possessed items
  • The question is closed, not deferred

Important Asymmetry: The two single-component scenarios are NOT equal:

ScenarioFuture RiskWhy
Keys only (no ciphertext)NoneKeys without data are cryptographically useless; there is nothing to decrypt
Ciphertext only (no keys)MediumCiphertext can still be attacked; "harvest now, decrypt later" remains viable

This asymmetry matters: a provider holding only keys (like a key delivery service) has a stronger position than one holding only ciphertext.

The Topology Defense

Provider StateSubpoena ResponseFuture RiskStrength
Holds ciphertext + keys"We can't unwrap"High (coexistence)Weakest (non-compliant)
Holds ciphertext only"We don't possess keys"Medium (cryptographic advances)Compliant
Holds keys only"We don't possess ciphertext"None (nothing to decrypt)Strong (PSDA)
Holds neither"We possess nothing"NoneStrongest

The ZKS-compliant answer is always a possession claim, not a capability claim. "We don't have it" is stronger than "We can't use it."

Note: PSDA (Provider-Side Data Absence) means the provider never holds ciphertext - it permits holding wrapped keys. The keys-only scenario is PSDA-compliant and particularly robust because even future cryptographic breakthroughs cannot help an attacker who has no ciphertext to attack. The holds neither scenario goes beyond PSDA requirements and represents the theoretical maximum separation.


Comparison Matrix

AspectZero TrustZKS
Primary controlPolicy enforcementTopological separation
Trust modelVerify continuouslyMake trust irrelevant
Privacy typeBehavioral/EnforcementStructural/Architectural
Verification methodAudit policy complianceExamine architecture diagram
Failure modePolicy failure → exposurePolicy failure → still protected
Compulsion resistancePolicy may be overriddenNothing to compel
Subpoena response"We won't" or "We can't""We don't possess"
Future-proofingDepends on policy durabilityDepends on topology durability

The Gap Zero Trust Leaves Open

Scenario: Perfect Zero Trust, Failed ZKS

Organization implements:

  • Strong identity verification (MFA, continuous auth)
  • Micro-segmented network
  • Device posture verification
  • Application-level access control
  • Comprehensive logging and monitoring
  • Zero standing privileges

But at the architectural level:

  • Provider holds ciphertext on their storage
  • Provider holds wrapped keys in their HSM
  • Components coexist under provider control
  • Topology places trust burden on provider

Result:

  • Perfect policy compliance
  • Complete ZKS failure
  • Provider can be compelled to attempt decryption
  • "Harvest now, decrypt later" remains viable

Why This Matters

Zero Trust asks: "Is this access request authorized?" ZKS asks: "Does the topology make authorization irrelevant for decryption?"

A Zero Trust system protects against unauthorized access. It doesn't protect against:

  • Authorized access by a compelled provider
  • Future capability to decrypt currently-held components
  • Insider threats with legitimate access
  • Acquisition by entity with different policies

ZKS protects against all of these by ensuring the topology doesn't permit them.


How They Work Together

Defense in Depth Model

Logical Component Model & Sovereignty Boundary

Practical Integration

Zero Trust protects the Client Sovereignty Domain:

  • Strong authentication to user devices
  • Device posture verification
  • Micro-segmentation of CSD networks

ZKS ensures topology prevents provider decryption:

  • Data Plane and Key Plane never coexist under provider control
  • Even with full provider infrastructure access, topology prevents decryption
  • Zero Trust failures don't compromise structural privacy

Addressing Common Objections

"We have Zero Trust policies preventing admin decryption"

Response: Zero Trust policies control access. They don't control topology. If your architecture places ciphertext and keys under the same control, policy failure or legal compulsion can still lead to decryption. ZKS ensures the topology makes this impossible regardless of policy.

"Our admins are verified and monitored"

Response: Verification and monitoring are behavioral controls. They depend on the admin's trustworthiness and the monitoring system's effectiveness. ZKS makes admin trustworthiness irrelevant - there's nothing for them to decrypt because the topology doesn't permit it.

"We're ISO 27001 / SOC 2 certified"

Response: Certifications verify policy compliance and security controls. They don't verify topology. A certified provider can still hold both ciphertext and keys. Certification is behavioral assurance; ZKS is structural assurance.

"We have a Data Processing Agreement limiting data use"

Response: DPAs are contracts - behavioral controls. They can be violated, overridden by legal compulsion, or rendered irrelevant by acquisition. ZKS ensures the topology makes contractual controls unnecessary for privacy protection.


Regulatory Alignment

RegulationZero Trust AlignmentZKS Alignment
GDPRAccess controls for personal dataStructural measure: processor cannot access regardless of policy
HIPAAAccess controls for PHIArchitectural control: covered entity topology prevents exposure
Schrems IIAccess restrictions for EU dataTopological defense: US provider cannot comply with foreign demands (doesn't possess components)
SOC 2Access control criteriaStructural evidence: topology diagram demonstrates separation
FedRAMPZero Trust requirementsComplementary architectural controls

Schrems II Note: ZKS is particularly relevant for cross-border data protection. The question isn't whether a US provider will comply with US government demands - it's whether the topology makes compliance possible. If the provider doesn't possess both components, compliance is architecturally impossible.


Implementation Considerations

For Zero Trust Implementations Adding ZKS

Current StateZKS AdditionOutcome
Server-side encryptionClient-side encryptionKeys never enter provider topology
Provider-held keysUser-controlled keysKey Plane exits provider control
Centralized key managementDistributed topologyNo single point of coexistence
Access-controlled dataAccess-controlled ciphertext + separated keysDefense in depth

For ZKS Implementations Adding Zero Trust

Current StateZero Trust AdditionOutcome
Basic authenticationStrong identity verificationReduced CSD compromise risk
Flat networkMicro-segmentationLateral movement prevention
Static authorizationContinuous verificationAdaptive access control
Limited loggingComprehensive auditThreat detection within CSD

Recommendations

For Security Architects

  1. Implement both - Zero Trust for access control, ZKS for topological separation
  2. Verify differently - Zero Trust via policy audit; ZKS via architecture diagram review
  3. Layer appropriately - Zero Trust protects CSD; ZKS ensures provider blindness
  4. Document topology - Architecture diagrams should clearly show plane separation

For CISOs

  1. Different audits - Zero Trust audits verify policy; ZKS audits verify topology
  2. Different questions - "Who can access?" vs. "Where do components exist?"
  3. Complementary certifications - Neither replaces the other
  4. Regulatory positioning - ZKS provides structural evidence for data protection claims

For Compliance Officers

  1. Structural evidence - ZKS compliance is demonstrable via architecture diagrams
  2. Compulsion defense - ZKS provides "impossibility" defense, not "unwillingness"
  3. Due diligence - Evaluate vendor topology, not just vendor policy
  4. Future-proofing - Topology survives policy changes and acquisitions

Conclusion

Zero Trust and Zero-Knowledge Sovereignty are complementary frameworks addressing different security dimensions:

FrameworkControlsTrust ModelPrivacy Type
Zero TrustAccess (who can reach)Continuous verificationBehavioral
ZKSTopology (where components exist)Trust irrelevanceStructural

Zero Trust ensures unauthorized parties cannot access resources.

ZKS ensures the topology makes provider trust irrelevant - components never coexist under external control, so there's nothing to trust them with.

A robust security architecture implements both:

  • Zero Trust to verify and control access
  • ZKS to ensure that even with access, the topology prevents decryption

The key insight: Architecture beats policy. Topological separation provides structural privacy that survives policy failures, legal compulsion, insider threats, and acquisitions. Zero Trust controls access; ZKS makes trust irrelevant.


References

  • NIST SP 800-207: Zero Trust Architecture
  • ZKS-1.0: Zero-Knowledge Sovereignty Standard
  • CISA Zero Trust Maturity Model
  • Forrester Zero Trust eXtended (ZTX) Framework