Executive Summary
The traditional security model — protect the network perimeter, trust everything inside — is broken. Remote work, cloud adoption, BYOD, and sophisticated attackers who operate inside corporate networks long before detection have rendered perimeter-based security insufficient.
Zero Trust Architecture (ZTA) operates on a fundamentally different principle: never trust, always verify. Every access request — regardless of source network, user identity, or device — is authenticated, authorised, and continuously evaluated before and during access.
This whitepaper provides a practical implementation roadmap aligned with NIST SP 800-207 (Zero Trust Architecture). It is written for enterprise security architects and CISOs who are planning a Zero Trust transformation.
Chapter 1: Zero Trust Principles
NIST SP 800-207 — The Authoritative Framework
NIST SP 800-207 defines Zero Trust as a set of guiding principles, not a specific product or technology. The seven core tenets:
-
All data sources and computing services are resources. Networks, devices, cloud services, and SaaS applications are all resources — not trusted infrastructure.
-
All communication is secured regardless of network location. Being on the corporate LAN provides no inherent trust advantage.
-
Access to individual enterprise resources is granted on a per-session basis. Access to one resource does not imply access to others.
-
Access to resources is determined by dynamic policy. Policies consider identity, device health, request context, and behavioural analytics — not just static network rules.
-
The enterprise monitors and measures the integrity and security posture of all owned and associated assets. Continuous monitoring, not point-in-time assessment.
-
All resource authentication and authorisation is dynamic and strictly enforced before access is allowed. Continuous re-evaluation, not one-time authentication.
-
The enterprise collects as much information as possible about the current state of assets, network infrastructure, and communications. Data-driven security decisions.
The Implicit Trust Problem
Traditional network security creates a binary: trusted (inside the perimeter) and untrusted (outside). Once inside, users and devices have broad access.
This fails in multiple ways:
- Lateral movement: An attacker who breaches the perimeter (via phishing, VPN compromise, or physical access) moves freely inside the “trusted” network
- Insider threats: Malicious or compromised insiders have trusted network access by definition
- Cloud and SaaS: Critical resources now live outside the traditional perimeter — corporate firewalls provide no protection
- Remote work: Users authenticate from home networks, coffee shops, and hotel WiFi — “network location” is meaningless as a trust signal
Chapter 2: Identity as the New Perimeter
In Zero Trust, identity is the primary control plane. Every access request must be authenticated with a strong, verified identity.
Strong Identity Foundation
Requirements for Zero Trust identity:
| Requirement | Implementation |
|---|---|
| Phishing-resistant MFA | FIDO2/WebAuthn (hardware keys, platform authenticators) |
| Continuous authentication | Conditional Access with session re-evaluation |
| Identity governance | Regular access reviews; automated provisioning/deprovisioning |
| Privileged access management | JIT access with approval; no persistent admin rights |
| Service account management | Managed identities / workload identity federation |
Conditional Access Policies
Conditional Access is the enforcement point for Zero Trust identity decisions:
Decision tree for every access request:
├── Is the user identity verified? (MFA, session state)
│ └── NO → Challenge for MFA
├── Is the device compliant? (MDM-enrolled, patched, not jailbroken)
│ └── NO → Block or require MDM enrollment
├── Is the request from an expected location/context?
│ └── NO (high-risk country, anonymous proxy) → Block or require step-up auth
├── Is the user's risk level acceptable?
│ └── HIGH (leaked credentials, anomalous behaviour) → Block or require password reset
└── ALLOW → Apply least-privilege access scope
Microsoft Entra ID Conditional Access implementation:
Policy: Require phishing-resistant MFA for all privileged roles
- Assignments: Users — Directory Roles: All privileged roles
- Conditions: None (always)
- Grant: Require authentication strength → Phishing-resistant MFA
Policy: Block legacy authentication
- Assignments: All users
- Conditions: Client apps — Legacy authentication clients
- Grant: Block
Policy: Device compliance required for sensitive apps
- Assignments: All users
- Cloud apps: [Production apps, Admin portal, HR system]
- Conditions: Device platforms — All platforms
- Grant: Require device to be marked as compliant
Identity Threat Detection
Zero Trust identity requires continuous monitoring for identity threats:
- Credential stuffing: Multiple failed authentications across accounts
- Impossible travel: Authentication from geographically impossible locations within a short time
- Token theft: Tokens used from IPs inconsistent with the user’s session
- Leaked credentials: Integration with HaveIBeenPwned or similar intelligence feeds
- Anomalous access patterns: Access at unusual times, unusual data volumes, unusual applications
Microsoft Entra ID Protection, Okta ThreatInsight, and Ping Identity all provide identity-specific threat detection.
Chapter 3: Device Trust
In Zero Trust, access decisions consider device health alongside user identity. An authenticated user on a compromised device is not a trusted user.
Device Trust Levels
| Level | Requirements | Access |
|---|---|---|
| Managed (full trust) | MDM-enrolled, compliant, corporate-owned or BYOD-enrolled | Full access to corporate resources |
| Registered (partial trust) | MDM-registered, basic compliance | Limited access (no access to sensitive apps) |
| Unmanaged (no trust) | No MDM, no compliance | No access, or isolated environment only |
Device Compliance Requirements
Define compliance policies in your MDM (Microsoft Intune, Jamf, VMware Workspace ONE):
| Requirement | Rationale |
|---|---|
| OS patches current (within 30 days) | Prevents exploitation of known vulnerabilities |
| EDR agent installed and active | Enables endpoint threat detection |
| Disk encryption enabled (BitLocker/FileVault) | Prevents data access if device is stolen |
| Screen lock configured (max 15 minutes) | Prevents unauthorised physical access |
| Not jailbroken/rooted (mobile) | Prevents OS security bypasses |
| Approved OS version | Ensures security baseline |
Non-compliant devices receive a blocked or restricted access policy from Conditional Access.
Certificate-Based Device Authentication
For the highest level of device assurance, deploy device certificates (via your MDM or PKI):
- Devices enrolled in MDM receive a device certificate signed by your internal CA
- Conditional Access can require a valid device certificate as an access condition
- Certificate-based authentication is phishing-resistant and cannot be replicated on unmanaged devices
Chapter 4: Microsegmentation
Microsegmentation replaces broad network access with granular, application-aware segmentation. Instead of “in the network, therefore trusted,” access is per-application, per-session.
Traditional vs Microsegmented Architecture
Traditional (flat network):
User (authenticated) → VPN → Full internal network access
├── Finance system
├── HR system
├── Engineering servers
└── Customer database
Lateral movement is unrestricted once VPN is established.
Microsegmented (Zero Trust):
User (identity + device verified) → ZTNA proxy
├── Finance system [Finance team only, MFA required]
├── HR system [HR team + managers, device compliant]
├── Engineering servers [Engineers only, MDM device]
└── Customer database [Block — not this user's scope]
Each application enforces its own access policy. Lateral movement requires a separate authorised access grant per application.
Identity-Aware Proxy (IAP)
Identity-Aware Proxy enforces access control at the application layer, regardless of network location:
- Google IAP: access to GCP-hosted applications via Google identity verification
- Cloudflare Access: application-level access control with Cloudflare as the enforcement point
- Azure App Proxy: on-premises applications exposed with Entra ID authentication
User → Cloudflare Access → Policy check (identity + device) → Application
[No VPN required; application not exposed to internet directly]
Software-Defined Perimeter and ZTNA
Zero Trust Network Access (ZTNA) solutions replace VPN for remote access:
| Feature | Traditional VPN | ZTNA |
|---|---|---|
| Network access granted | Full internal network | Per-application only |
| Device posture checked | Usually not | Required |
| Traffic visibility | Limited | Full, per-session |
| Lateral movement risk | High | Low (no network access) |
| User experience | Often poor (latency, hairpin routing) | Better (direct-to-application) |
ZTNA solutions: Zscaler Private Access, Palo Alto Prisma Access, Cloudflare Zero Trust, Microsoft Global Secure Access.
Chapter 5: Application Access and Data Protection
Least-Privilege Application Access
Apply least-privilege at the application level:
- Roles and permissions scoped to what each user needs for their function
- Just-in-time access to privileged application functions (approve elevated access on demand)
- Session recording for privileged application sessions (PAM tools: CyberArk, BeyondTrust, Delinea)
Data-Centric Protection
Zero Trust extends to data: data should be protected wherever it travels, not just at the perimeter.
Data classification and DLP:
- Classify data: Public, Internal, Confidential, Restricted
- Implement DLP (Data Loss Prevention) policies that follow data regardless of location:
- Microsoft Purview DLP (M365 + Windows endpoints)
- Google Workspace DLP
- Symantec DLP for mixed environments
- Prevent sensitive data from being copied to unmanaged devices, sent to personal email, or uploaded to unapproved cloud storage
Encryption as a control:
- Encrypt sensitive data at rest (database encryption, file-level encryption)
- Encrypt in transit (TLS everywhere)
- Encrypt in use for highest-sensitivity scenarios (confidential computing — Azure Confidential VMs, AWS Nitro Enclaves)
Rights Management: For documents that must be shared externally, use IRM (Information Rights Management) / sensitivity labels:
- Document-level encryption that follows the file wherever it goes
- Access revocable after sharing
- Audit log of who accessed the document
Chapter 6: Continuous Monitoring and Analytics
Security Operations in Zero Trust
Zero Trust generates richer telemetry than traditional architectures — and requires mature security operations to use it.
Data sources for Zero Trust monitoring:
| Source | Signals |
|---|---|
| Identity (Entra ID, Okta) | Authentication, MFA, risk signals, access patterns |
| Device (MDM, EDR) | Compliance status, threat alerts, behavioural anomalies |
| Network (ZTNA, proxy) | Application access, data transfer volumes, session details |
| Application | Authorization decisions, data access patterns |
| Data (DLP) | Data movement, policy violations |
| Cloud (CSPM) | Resource configuration, access to cloud resources |
User and Entity Behaviour Analytics (UEBA)
UEBA establishes behavioural baselines and detects anomalies:
- User accessing an unusual application for their role at an unusual time
- Data download volume significantly above normal
- Access from a new geographic location
- Privilege escalation request outside normal patterns
- Service account behaviour that deviates from its established pattern
UEBA platforms: Microsoft Sentinel (built-in UEBA), Splunk UBA, Securonix.
Trust Score and Adaptive Access
Advanced Zero Trust implementations use a continuous trust score:
Trust Score = f(
identity_verification_strength,
device_compliance_score,
behavioural_risk_score,
session_context_risk,
threat_intelligence_signals
)
if trust_score > 0.8: allow
if trust_score 0.5–0.8: step-up authentication required
if trust_score < 0.5: block, alert security team
This enables dynamic access decisions — a user whose trust score drops mid-session (due to unusual behaviour detected) can be required to re-authenticate or have their session terminated.
Chapter 7: Phased Implementation Roadmap
Zero Trust is a multi-year journey. A phased approach allows incremental improvement without disrupting operations.
Phase 1 — Identity Foundation (Months 1–6)
Objective: All users authenticate with strong, phishing-resistant MFA. Identity posture is fully visible.
Actions:
- Deploy MFA for all users (start with Entra ID MFA or Okta MFA)
- Enforce phishing-resistant MFA for all privileged roles
- Block legacy authentication protocols (NTLM, basic auth)
- Deploy identity risk-based Conditional Access (block high-risk sign-ins)
- Implement Privileged Identity Management (PIM/just-in-time access)
- Conduct access review and remove stale accounts/excessive permissions
- Deploy identity threat detection (Entra ID Protection, Okta ThreatInsight)
Phase 2 — Device Trust (Months 4–9)
Objective: All managed devices are enrolled in MDM and compliance is enforced as an access condition.
Actions:
- Deploy MDM (Microsoft Intune or Jamf) to all managed endpoints
- Define device compliance policies (patch level, encryption, EDR)
- Conditional Access: require device compliance for access to sensitive applications
- Deploy EDR (CrowdStrike, Microsoft Defender for Endpoint, SentinelOne) to all endpoints
- BYOD policy: define access levels for personal devices; implement MAM (Mobile Application Management)
Phase 3 — Application Access (Months 7–12)
Objective: Application access is explicitly authorised, not implicit from network location.
Actions:
- Identify all internal applications and their current access model
- Deploy ZTNA or IAP for highest-priority remote access use cases (replace VPN for critical applications)
- Implement least-privilege RBAC in all business-critical applications
- Deploy privileged access management (PAM) for administrative access to critical systems
- Application-level session monitoring for privileged access
Phase 4 — Network Segmentation (Months 9–18)
Objective: Lateral movement is constrained; microsegmentation enforced.
Actions:
- Audit current network trust relationships (flat network → segmentation priority)
- Implement VLAN segmentation for critical asset tiers
- Deploy microsegmentation for highest-risk environments (data centre, cloud)
- Replace remaining VPN access with ZTNA
- Network traffic inspection (SSL inspection at proxy layer)
Phase 5 — Data Protection and Continuous Improvement (Months 15–24)
Objective: Data is protected at rest, in transit, and in use. Continuous monitoring enables adaptive access.
Actions:
- Data classification programme implemented
- DLP policies deployed (endpoint, cloud, email)
- Sensitivity labels and IRM for sensitive documents
- UEBA deployed and baselined
- Trust score / adaptive access policy implemented
- Zero Trust maturity assessment (CISA ZT Maturity Model)
Conclusion
Zero Trust is not a product — it is an architectural approach that takes years to fully implement. The organisations that succeed are those that treat it as a programme, not a project: phased, incremental, measured against clear outcomes.
The single most impactful Zero Trust action: Deploy phishing-resistant MFA for all users and eliminate legacy authentication. This addresses the most common initial access vector (credential phishing) and provides immediate, measurable risk reduction.
From there, build the device trust, application access, and segmentation layers over time. Each phase builds on the last, and each delivers independent risk reduction.
CyberneticsPlus provides Zero Trust assessment, architecture design, and implementation support across Microsoft, Google, and multi-cloud environments. Contact us to begin your Zero Trust journey.