πŸ•ΈοΈ Ada Research Browser

README.md
← Back

πŸ” Enterprise Zero Trust Architecture β€” Microsoft Entra ID & Multi-Cloud IAM

Architect: Kehinde (Kenny) Samson Ogunlowo | Principal AI Infrastructure & Security Architect
Clearance: Active Secret Clearance | Citadel Cloud Management

Azure AWS GCP Terraform License: MIT

Enterprise Zero Trust architecture implementation using Microsoft Entra ID, AWS IAM, and Google Cloud IAM β€” with real-world patterns from Cigna (85% reduction in unauthorized access), Lockheed Martin (FedRAMP High + CMMC L2), and Ceretax (federal-grade tax compliance). Implements NIST SP 800-207 Zero Trust Architecture across hybrid multi-cloud environments.


Zero Trust Principles Implemented

"Never trust, always verify" β€” across every user, device, workload, and network path

Principle Implementation
Verify explicitly MFA, device compliance, risk-based Conditional Access
Use least privilege JIT/JEA, PIM, attribute-based access control (ABAC)
Assume breach Network segmentation, lateral movement prevention, full audit
Continuous validation Real-time risk scoring, session re-evaluation, anomaly detection

Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                        IDENTITY PLANE                                β”‚
β”‚  Microsoft Entra ID  |  AWS IAM Identity Center  |  Google Cloud IAMβ”‚
β”‚  ─────────────────────────────────────────────────────────────────── β”‚
β”‚  Conditional Access  |  Permission Sets           |  IAM Conditions  β”‚
β”‚  PIM / JIT Access    |  SCPs / Permission Bdry    |  Org Policies    β”‚
β”‚  FIDO2 Passwordless  |  IAM Roles for SA          |  Workload Identityβ”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                        DEVICE PLANE                                  β”‚
β”‚  Intune MDM/MAM  |  CrowdStrike Falcon  |  Entra Joined Devices     β”‚
β”‚  Device compliance policies  |  TPM attestation  |  ZTNA            β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                        NETWORK PLANE                                 β”‚
β”‚  Azure Private Endpoints  |  AWS PrivateLink  |  GCP Private SC      β”‚
β”‚  VPC Service Controls     |  Network Policies |  Istio mTLS          β”‚
β”‚  Azure Firewall Premium   |  AWS Network FW   |  Cloud Armor         β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                     APPLICATION & DATA PLANE                         β”‚
β”‚  Azure AD App Proxy  |  IAP (GCP/Azure)  |  BeyondCorp Enterprise   β”‚
β”‚  FIPS 140-2 KMS      |  HSM-backed keys  |  Azure Confidential VM   β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                      VISIBILITY & ANALYTICS                          β”‚
β”‚  Microsoft Sentinel  |  Chronicle SIEM   |  AWS Security Hub        β”‚
β”‚  Entra ID Protection |  Defender XDR     |  Security Command Center  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Core Components

Microsoft Entra ID (Azure AD)

AWS IAM (GovCloud patterns)

Google Cloud IAM


Compliance Coverage

Standard Controls Implemented
NIST SP 800-207 Full ZTA implementation: identity, device, network, application pillars
CMMC Level 2 Access control (AC), Audit & Accountability (AU), ID & Authentication (IA)
FedRAMP High AC, AU, IA, SC, SI controls β€” implemented at Lockheed Martin
HIPAA Security Rule PHI access controls, audit logging, transmission encryption (Cigna)
NIST 800-53 Rev5 AC-2, AC-6, IA-2, IA-5, SC-7, SC-28, AU-2, AU-6

Repository Structure

entra-iam-zero-trust/
β”œβ”€β”€ terraform/
β”‚   β”œβ”€β”€ azure/
β”‚   β”‚   β”œβ”€β”€ conditional-access/     # Entra CA policies
β”‚   β”‚   β”œβ”€β”€ pim/                    # PIM role assignments
β”‚   β”‚   β”œβ”€β”€ entra-id-protection/    # Risk policies
β”‚   β”‚   └── private-endpoints/      # Network Zero Trust
β”‚   β”œβ”€β”€ aws/
β”‚   β”‚   β”œβ”€β”€ iam-identity-center/    # SSO configuration
β”‚   β”‚   β”œβ”€β”€ permission-boundaries/  # IAM guardrails
β”‚   β”‚   β”œβ”€β”€ scps/                   # Org Service Control Policies
β”‚   β”‚   └── privatelink/            # Network isolation
β”‚   └── gcp/
β”‚       β”œβ”€β”€ workload-identity/      # WIF federation config
β”‚       β”œβ”€β”€ org-policies/           # Hierarchy controls
β”‚       β”œβ”€β”€ vpc-service-controls/   # Data perimeters
β”‚       └── beyondcorp/             # Context-aware access
β”œβ”€β”€ policies/
β”‚   β”œβ”€β”€ conditional-access/         # CA policy JSON templates
β”‚   β”œβ”€β”€ scp-examples/               # AWS SCP examples
β”‚   └── org-policy-constraints/     # GCP org constraints
β”œβ”€β”€ monitoring/
β”‚   β”œβ”€β”€ sentinel-analytics/         # Sentinel KQL queries
β”‚   β”œβ”€β”€ chronicle-rules/            # Chronicle YARA-L rules
β”‚   └── security-hub-findings/      # AWS findings aggregation
└── docs/
    β”œβ”€β”€ architecture-diagrams/
    β”œβ”€β”€ runbooks/                   # Incident response procedures
    └── compliance-mappings/        # Control to framework mappings

Production Impact


Author

Kehinde (Kenny) Ogunlowo β€” citadelcloudmanagement.com | kogunlowo@gmail.com | LinkedIn