Zero Trust: The Architecture That Assumes You’ve Already Been Breached
The perimeter is gone. It’s been gone for years — remote work, cloud migration and supply chain attacks finished it off. Zero Trust isn’t a trend. It’s the only security model that was designed for the world we actually live in.
Zero Trust gets abused as a marketing term constantly. Every vendor claims their product delivers it. So let me be direct: Zero Trust is not a product. It is not a vendor. It is not something you buy, deploy, and check off. Zero Trust is an architectural principle that says: never grant access based on location or network alone — always verify identity, device health, and context before granting access to any resource.
John Kindervag coined the term at Forrester in 2010 based on a simple observation: the trusted internal network was a fiction. Once an attacker got past the perimeter — through phishing, a compromised contractor, a vulnerable VPN — they moved laterally with almost no resistance. Zero Trust eliminates the concept of implicit trust inside the network.
Microsoft, CISA, NIST and the NSA have all published Zero Trust architecture frameworks. They all share the same core: verify explicitly, use least privilege access, assume breach. The implementation details differ, but the philosophy is consistent.
IBM Cost of a Data Breach Report 2025
Microsoft Security Intelligence Report 2024
Verizon DBIR 2024
Microsoft Zero Trust Adoption Report 2024
Cisco Cybersecurity Readiness Index 2025
Verify Explicitly
Every access request — every single one — must be authenticated and authorised using all available signals: identity, device health, location, service, data classification, and anomaly detection. A user on the corporate network with a valid credential is not automatically trusted.
Use Least Privilege
Grant access to exactly what’s needed for exactly the time it’s needed. Just-In-Time access, Just-Enough-Access policies, and risk-based adaptive controls prevent the “over-privileged admin” scenario that shows up in almost every post-breach investigation I’ve been part of.
Assume Breach
Design every system as though an attacker is already inside. This drives microsegmentation, end-to-end encryption of data in transit and at rest, comprehensive logging, and minimal blast radius design. It also forces you to think about detection before prevention.
Identity (The New Perimeter)
Every user, service account, and workload must have a verified, managed identity. MFA, passwordless authentication, Privileged Identity Management, and continuous access evaluation policies. This is your highest-ROI starting point.
Devices (Endpoint as Signal)
Device health is an access signal, not just an endpoint security problem. Compliance status, patch level, EDR deployment, and certificate validity should all inform access decisions. An unmanaged personal device should never reach a sensitive application.
Network (Microsegmentation)
Flat networks are an attacker’s best friend. Microsegmentation limits lateral movement so that a compromised workstation in marketing cannot reach the finance database. Software-defined networking makes this manageable without a hardware replacement cycle.
Applications (App-Level Access)
Application access should be identity-driven, not network-driven. Zero Trust Network Access (ZTNA) replaces VPN for most use cases, providing application-specific access without exposing the full network to remote users.
Data (Protect the Crown Jewels)
Data classification determines access policy. Sensitive data should be encrypted, access-logged, and subject to DLP controls that follow the data — not just protect it at the boundary. Know where your sensitive data lives before you can protect it.
Visibility & Analytics
Zero Trust requires telemetry. You need full visibility across identity, device, network, application, and data layers to make adaptive access decisions and detect anomalies. This is where SIEM, XDR, and UEBA tools earn their keep.
Buying a Product and Calling It Done
Zero Trust is a journey across multiple pillars and years. A ZTNA gateway or an identity provider alone isn’t Zero Trust — it’s one component of a much larger architecture change.
Starting with Network Instead of Identity
Identity delivers the fastest ROI and the broadest impact. Most organisations get better security outcomes starting with identity and MFA than from microsegmentation projects that take 18 months to complete.
Ignoring Legacy Applications
Modern Zero Trust works beautifully with cloud applications. Legacy on-premise systems that can’t support modern authentication break the model. You need a strategy for legacy — not an exception list that grows indefinitely.
Treating It as a Security Project
Zero Trust touches every user and every application. Without business sponsorship and change management, your ZT rollout will fail under pushback from IT teams, business units, and executive assistants who can’t access their tools.
No Measurement Framework
Zero Trust maturity is measurable. Without a baseline and a target maturity model (CISA’s ZT Maturity Model is excellent), you cannot demonstrate progress to the board or justify continued investment.
— Dr. Erdal Ozkaya, CISO & Microsoft MVP
IDC research shows that organisations with a structured Zero Trust roadmap achieve measurable security improvements 2.4× faster than those with ad-hoc implementations. Here’s the sequence I recommend based on real-world deployments:
- 90 days: MFA for all users and all applications. No exceptions. This is your biggest single risk reduction.
- 6 months: Device compliance policies. No unmanaged device accesses sensitive resources.
- 12 months: ZTNA replacing VPN. Application-level access with conditional access policies.
- 18 months: Network microsegmentation starting with your most critical assets.
- 24 months: Data classification and DLP integrated into access policies. Full telemetry across all pillars.
This isn’t a fixed timeline — your starting point, team size, and budget will adjust it. But the sequence is right. Identity before network. Quick wins before complex projects. Measurement throughout.
CISO Toolkit
Zero Trust assessment templates, board reporting frameworks, and vendor evaluation guides.
ISO 27001 Toolkit
Identity and access management controls aligned to ISO 27001:2022 Annex A.
Sentinels Talk Show
Zero Trust architecture discussions with practitioners who’ve done it at scale.
26 Books on Security
Dr. Ozkaya’s complete published library — practical security leadership from CISO to board level.
Book Dr. Ozkaya
Zero Trust strategy workshops and advisory sessions for executive teams and boards.
What your board needs to hear about zero trust
Three talking points, one metric, one question. Screenshot this for your next board prep.
Zero trust is not a product you buy. It is a five-year identity and segmentation programme. Anyone who tells the board it can be “switched on” is selling something.
The first-year payoff is not exotic — it is killing standing privileged access and getting MFA on every administrative path, including the ones nobody documented. Most material incidents I investigate come down to one of those two failures.
Measure progress in coverage, not maturity tiers. “85% of privileged sessions go through just-in-time access” is a board metric. “Level 3 of 5” is not.
Zero Trust Is a Journey. Let’s Map Yours.
Most Zero Trust programmes stall because the roadmap is wrong, the business case isn’t made, or the organisation tries to do too much at once. I help executive teams build Zero Trust strategies that are realistic, measurable, and actually get implemented.
Start the Conversation →
Zero Trust FAQ — Honest Answers to the Questions CISOs Actually Ask
I’m a CISO at a mid-size company — where do I actually start with zero trust without breaking everything?
Start with identity, not the network. Most “we tried zero trust and it broke things” stories come from teams that began by ripping out VPNs or rearchitecting the network — that’s the deepest, riskiest layer. Identity is where you get the fastest measurable wins with the lowest blast radius.
Concretely, my recommended first 90 days for a mid-size company:
- Inventory all identities (human + service accounts + machine identities). You can’t enforce zero trust on assets you don’t know exist.
- Enforce MFA everywhere — including admin accounts, service accounts where possible, and anywhere SSO can be enforced.
- Implement conditional access policies based on device posture, user risk, and location.
- Pick one critical application (typically email or your most sensitive SaaS) and route it through a zero-trust access broker before touching legacy network access.
Don’t start with “let’s replace the VPN.” Start with “let’s make every authentication smarter.” That order is the difference between a successful zero-trust journey and a six-month outage.
How does zero trust align with NIST 800-207, and do I need to follow it strictly?
NIST 800-207 is the de facto reference framework for zero trust architecture in the US, and it’s increasingly cited by regulators, federal contracts (Executive Order 14028), and enterprise risk committees. You don’t need to follow it line-by-line, but you should be able to map your architecture to its three core tenets: (1) all resource access is per-session and explicitly authenticated, (2) access is granted with least privilege, and (3) trust is continuously evaluated, not assumed at login.
Where most organizations slip is treating NIST 800-207 as a checklist instead of a model. The document deliberately doesn’t prescribe vendors or specific products — it describes outcomes. Your zero-trust architecture might use Microsoft, Google BeyondCorp principles, Zscaler, Palo Alto, or a hybrid stack. What matters is that an auditor or board member can trace each major access decision back to the three tenets above.
For NATO and federal-adjacent environments, alignment is non-negotiable. For mid-market enterprises, NIST 800-207 is the right north star but not the only valid path.
Does zero trust mean I have to replace my VPN?
Eventually yes, but not immediately, and not by ripping it out. The replacement model is Zero Trust Network Access (ZTNA), which authenticates and authorizes every connection per-application rather than granting a flat tunnel into the corporate network the way a VPN does.
The practical migration path I recommend:
- Keep the VPN running as your fallback for legacy systems that genuinely can’t be modernized.
- Roll out ZTNA for cloud-hosted and modern applications first — these were never well-served by VPN anyway.
- Migrate critical legacy apps by putting them behind a ZTNA broker as a wrapper (most modern ZTNA platforms support this).
- Decommission the VPN only when fewer than ~10% of authenticated sessions actually use it.
Trying to do this in one cutover is how companies break things. ZTNA and VPN can coexist for 12–24 months without issue.
What are the most common zero trust implementation mistakes?
After advising on zero-trust programs across multiple organizations and continents, the same five mistakes show up again and again:
- Treating it as a product purchase. No vendor sells you “zero trust.” If a sales pitch says otherwise, walk away. Zero trust is an architectural model and a discipline, not a SKU.
- Starting with the network. Microsegmentation is powerful but it’s the deepest, hardest layer. Start with identity.
- Ignoring service accounts and machine identities. Most enterprises have 10–100x more non-human identities than human ones, and they’re often the unmonitored attack path.
- Skipping continuous monitoring. Zero trust requires real-time signal — device posture, user behavior, threat context. Without that telemetry, you have static authentication wearing zero-trust branding.
- Underestimating the cultural shift. Engineers used to “trusted internal networks” will resist friction. Executive sponsorship is what carries you through the resistance phase.
If you avoid those five, you’ll be ahead of 80% of programs I’ve seen.
Is zero trust mandatory under any regulation or government framework?
For US federal civilian agencies, yes — Executive Order 14028 (May 2021) and follow-on OMB memo M-22-09 mandate zero-trust architecture across the federal government, with specific milestones for agencies. Department of Defense organizations are bound by the DoD Zero Trust Reference Architecture and CISA’s Zero Trust Maturity Model. NATO has its own zero-trust mandate evolving in parallel for member-state defence networks.
For private-sector organizations, zero trust is not strictly mandated, but it’s increasingly required by proxy — through cyber-insurance underwriting questionnaires, customer security audits, SOC 2 / ISO 27001 control evolutions, and supply-chain risk assessments from federally-regulated customers. If you sell to government, defence, healthcare, or financial services, expect zero-trust questions in every RFP from now on.
The honest answer: even where zero trust isn’t legally required, it’s becoming the de facto baseline of “reasonable cybersecurity” — which matters in litigation, insurance claims, and breach-disclosure scenarios.
How long does zero trust implementation actually take, and how much does it cost?
For a typical mid-size enterprise (500–5,000 employees), expect a 24–36 month journey to mature zero-trust posture across identity, devices, network, applications, and data. A realistic phasing is:
- Year 1: Identity hardening (MFA, conditional access, privileged access management). This phase alone delivers 60–70% of the security uplift.
- Year 2: ZTNA rollout, device posture enforcement, application-level access controls, microsegmentation pilots.
- Year 3: Data classification and access controls, automation and continuous validation, decommissioning legacy trust assumptions.
Cost varies wildly by starting posture and existing licensing. A rough planning range: $50–$200 per user per year in net-new tooling for a moderately mature organization, less if you’re already heavy on Microsoft E5 or similar bundles that include most components.
The mistake in budgeting is treating zero trust as a project with an end date. It’s an operating model. Once you’re “done,” the controls are evergreen — they just need maintenance, not re-implementation. The TCO conversation should be operational expense, not capital project.
