Blog
Zero trust at the edge: identity, device posture, and API calls from browsers
CORS alone cannot authenticate users; pair edge policies with strong tokens and continuous validation.
1 min read
zero-trustsecurityedge
Beyond Allow-Origin
Use short-lived access tokens bound to audience and scope; refresh with rotation to reduce replay windows.
Device posture checks belong near identity providers; do not try to replicate them purely with CORS headers.
Observability
Correlate gateway denials with user sessions to detect token theft attempts quickly.
Alert on spikes in 401/403 separated from 429 to distinguish auth incidents from quota issues.
