ChaptersEventsBlog
Join Cohesity Catalyst on Tour at the data security and AI summit in NYC, Paris, or Singapore →

Why Zero Trust Needs to Start at the Session Layer

Published 02/19/2026

Why Zero Trust Needs to Start at the Session Layer

Most of us grew up professionally in a world where “secure access” meant encrypt the tunnel and harden what’s exposed. VPNs, TLS/mTLS, WAFs, EDR, patching, detection, response... the whole modern stack is built around the assumption that the network and its endpoints are visible. Security starts once a connection attempt is already in motion.

The problem is that the internet didn’t get that memo. Our core TCP/IP networking systems were designed to facilitate easy connection, rather than to fend off malicious actors. That default visibility has become a liability in the modern era.

In other words: visibility is vulnerability, especially when attackers (human or machine) can scan, probe, and exploit at machine speed.

Instead of asking “How do we detect bad stuff faster?”, we need to ask a more disruptive question:

What if we didn’t let unauthenticated systems even see what to attack?

That’s the promise of the Network-infrastructure Hiding Protocol (NHP), a specification introduced in our new Stealth Mode SDP for Zero Trust Network Infrastructure publication. NHP is a stealth-driven protocol that applies Zero Trust at OSI Layer 5 (the session layer). It enforces deny-all by default and requires authenticate-before-connect before any real session is established.

 

Layer 5 trust-by-default

Modern Zero Trust solutions often live predominantly at OSI Layers 6 and 7 (presentation and application). Think VPN replacements for encrypted communication and web proxies for application-layer filtering. Those are important, but they don’t change a fundamental property of TCP/IP networks: If a service is exposed, anyone can try to connect to it.

That connection attempt, whether it's successful or not, creates opportunities for:

  • Reconnaissance and fingerprinting
  • Credential stuffing and brute forcing
  • Pre-authentication exploits
  • DDoS pressure and resource exhaustion
  • “Spray and pray” scanning that only needs one weak host

This is the foundational vulnerability inherent in modern networks: the inherent trust granted to any connection attempt at the 5th layer.

And now we add AI to the mix.

 

AI changes the math

AI-driven offensive tooling accelerates:

  • Speed of execution (time from discovery to exploitation shrinking dramatically)
  • Scale of operations (continuous scanning and probing of millions of potential targets)
  • Adaptive capabilities (attack logic that learns and refines when blocked)
  • Autonomous exploitation (AI agents that can discover and exploit vulnerabilities with minimal human direction)

Reactive security models don’t get faster just because attackers do. If exploitation time collapses, then “see it, alert on it, respond to it” becomes an unreliable strategy, especially for internet-facing assets.

Instead, take a preemptive move: reduce the attacker’s opportunities before they can touch anything meaningful.

 

Make the network invisible until proven otherwise

NHP is the third generation of network hiding technology, evolving beyond:

  • First-gen port knocking
  • Second-gen Single-Packet Authorization (SPA)

At a high level, NHP is built to enforce "No authentication, no visibility. No visibility, no attack surface." Unlike TLS/mTLS (which secures communications but still exposes endpoints), NHP is designed to hide ports, IP addresses, and even domain names until policy approves access.

This is not a replacement for everything else. You still need application-layer and runtime controls once access is granted. But this is a powerful layer of prevention that many Zero Trust programs under-emphasize.

 

Why session-layer hiding matters for zero-days

If attackers can’t reach your exposed service, they can’t exploit its unknown vulnerability. NHP implements ‘never trust, always verify’ by enforcing ‘deny-all’ rules by default, allowing only authorized hosts to establish connections. This reduces risk from vulnerability exploitation, particularly zero-day exploits.

NHP also targets pre-authentication exposure, which is where a lot of high-impact vulnerabilities live. These include unauthenticated RCEs, pre-auth auth bypass, weak default endpoints, exposed management interfaces, forgotten test services, and more.

 

“Mitigate” isn’t vague here

NHP is designed to mitigate:

  • Network reconnaissance and discovery (especially automated/AI scanning)
  • DNS-based attacks (hijacking, cache poisoning) via authenticated/encrypted resolution
  • DDoS by requiring authentication before connection and concealing addresses
  • Lateral movement (even inside corporate networks) by keeping infrastructure “invisible” post-breach
  • Replay attacks through session-specific cryptographic protections

 

What “authenticate-before-connect” looks like in practice

If “stealth mode” sounds hand-wavy, here's a workflow to make it concrete:

  1. The NHP-Agent sends a knock request (NHP-KNK) to the NHP-Server before accessing a protected resource.
  2. The NHP-Server authenticates the agent and queries an Authorization Service Provider (ASP). Think IAM, SDP controller, policy engine.
  3. If allowed, the server sends an “open door” request (NHP-AOP) to the NHP-Access Controller (NHP-AC), which enforces deny-all by default and dynamically opens access for a limited window.
  4. The agent receives a confirmation (NHP-ACK) that includes the actual address/port and the session validity period so legitimate clients don’t have to guess and retry.

 

Why this is also an attack surface reduction story

Yes, NHP contributes to many cryptographic improvements: Noise Protocol Framework, ECC efficiency, identity-based cryptography (IBC), replay resistance, header design, obfuscation fields, and so on.

But from a general IT/security  perspective, the bigger strategic point is architectural. NHP moves Zero Trust enforcement earlier in the stack. You verify first, then allow any connection attempt to exist.

NHP renders network resources invisible to unauthorized users. This is a shift from “protect what’s exposed” to don’t expose it in the first place.This is the kind of control that scales well against AI-enabled threats, because it reduces the number of tries an attacker can cheaply make.

 

DNS as a stealth problem

One of the most interesting extensions of the session-layer idea is how DNS integrates: NHP can tie DNS resolution to a successful authenticated handshake.

Instead of public DNS records advertising where things live or attackers enumerating domains and mapping infrastructure, NHP can use a private domain identifier and resolve it only after authentication. This keeps the resolver only accessible by the NHP-Server and makes domains not publicly resolvable.

 

Where NHP fits in a Zero Trust program

If you’re building (or repairing) a Zero Trust roadmap, NHP naturally supports three common goals:

  1. Shrink exposed attack surface for critical services (especially those you can’t modernize overnight).
  2. Reduce noisy reconnaissance and scanning, which in turn reduces downstream alert fatigue and DDoS fragility.
  3. Limit lateral movement by making internal resources “need-to-know” invisible, not merely “segmented.”

It’s not magic. There are important caveats, like the need for complementary controls post-authentication and operational risk considerations (server availability, key management choices, latency windows).

But if your Zero Trust journey has mostly been identity, proxies, and mTLS at the app layer, you may be leaving a key layer under-protected. Attackers (and their AI tooling) will happily keep knocking on doors you didn’t realize you left visible.

Cover of Stealth Mode SDP

 

Want the technical details?

The full CSA research document goes deeper on:

  • NHP’s architecture components (NHP-Agent, NHP-Server, NHP-AC) and workflow
  • Cryptographic framework choices (Noise, ECC, IBC) and protocol mechanics
  • Message types, logging, and integration patterns with SDP, DNS, and FIDO

Download and read the full paper for implementation-level depth.

Share this content on your favorite social network today!

Unlock Cloud Security Insights

Unlock Cloud Security Insights

Choose the CSA newsletters that match your interests:

Subscribe to our newsletter for the latest expert trends and updates