The promise of network security, or perimeter enforcement, has always been with good intentions until the wrong person gets inside of that perimeter. Once inside, they're simply considered 'trusted' in the environment. With zero trust, though, each and every entity in the organization — both human users and automated workers — are continually authenticated throughout every step of the access chain. This begs the question, "Who then really needs network or perimeter security?" In this talk, we'll look past perimeters and discuss how to implement a secure, internet-facing, identity-first, zero-trust model for your global infrastructure access using an open-source access platform like Teleport as an example. We'll focus not only on the importance of true identity verification for every user and machine, but also on the strict enforcement of device trust as well.