24 July 2025

3 min Reading Time

TL;DR

  • Zero Trust eliminates the concept of a trusted network – every access attempt is verified.
  • Identity is the new perimeter: authentication and authorization with every request.
  • Microsegmentation isolates workloads and limits blast radius during breaches.
  • ZTNA (Zero Trust Network Access) replaces traditional VPNs for remote access.
  • Google BeyondCorp has proven that Zero Trust works at enterprise scale.

The traditional firewall logic – safe inside, dangerous outside – fails in the cloud. Employees work from anywhere, applications run across multiple cloud providers, and attackers are already inside the network. Zero Trust flips the security model: trust no one, verify everything, minimize access rights.

Why the Perimeter Model Has Failed

Traditional security relies on a clear boundary: inside the corporate network is safe, outside is not. VPNs extend this perimeter to remote employees. The problem: in the cloud, there is no perimeter. Workloads run on AWS, Azure, and GCP; employees use SaaS applications directly; and IoT devices connect without a VPN.

Moreover, 60% of breaches stem from insider threats or compromised credentials. Once an attacker is inside the perimeter, they can move laterally – after all, the network trusts them. Zero Trust directly addresses this failure.

Core Principles of Zero Trust

Verify Explicitly: Every access request is verified using all available data points – user identity, device health, location, anomaly detection. No implicit trust, even from within the corporate network.

Least Privilege Access: Users and services receive only the minimum necessary permissions, granted for limited time periods (Just-in-Time Access). Administrative rights are not permanently assigned but requested via workflow and automatically revoked after use.

Assume Breach: The security model assumes attackers are already inside the network. Microsegmentation limits blast radius, end-to-end encryption protects data even internally, and continuous monitoring detects anomalous behavior.

ZTNA: The End of the VPN

Zero Trust Network Access (ZTNA) replaces traditional VPNs with application-specific access. Instead of a network tunnel granting access to the entire corporate network, ZTNA connects the user only to the specific application they need – based on identity, device posture, and context.

Zscaler Private Access, Cloudflare Access, and Google BeyondCorp Enterprise are leading ZTNA solutions. The advantage is twofold: improved security (no lateral movement) and better user experience (no VPN client, no latency from backhauling traffic).

Microsegmentation in the Cloud

Microsegmentation divides the network into isolated segments at the workload level. Rather than relying solely on a perimeter firewall, each workload has its own access rules. In Kubernetes, Network Policies and service meshes (Istio, Cilium) natively enable microsegmentation.

The practical effect: if a container is compromised, the attacker cannot access adjacent services. The blast radius of a breach shrinks from “entire network” to “single service.”

Implementation Strategy: Step by Step

Zero Trust is not a product you buy, but an architecture you build. Implementation proceeds incrementally:

Phase 1: Identity Foundation – SSO with MFA for all applications. Conditional Access Policies based on user, device, and location. This delivers the highest ROI.

Phase 2: ZTNA for remote access – replace VPN with application-specific access. Simultaneously implement Device Trust (only managed, compliant devices gain access).

Phase 3: Microsegmentation for critical workloads – enforce Network Policies in Kubernetes, configure cloud Security Groups with deny-by-default rules.

Phase 4: Continuous Verification – deploy UEBA (User and Entity Behavior Analytics) to detect anomalous access patterns, and automate incident response.

Frequently Asked Questions

Is Zero Trust really “never trust”?

The name is misleading. Zero Trust doesn’t mean no one is trusted – it means trust is never assumed. Every access request is explicitly verified based on identity, device health, context, and behavior. After successful verification, access is granted – but only within defined timeframes and scopes.

How long does Zero Trust implementation take?

Zero Trust is a multi-year journey, not a one-time project. Phase 1 (Identity + MFA) can be completed in 3-6 months and delivers immediate security benefits. Full microsegmentation and continuous verification may take 2-3 years for a mid-sized company.

Can small businesses implement Zero Trust?

Yes. Core principles (MFA, least privilege, conditional access) can be implemented using cloud-native tools like Azure AD Conditional Access or Google BeyondCorp, even for SMEs. Microsegmentation and UEBA are more relevant for larger environments. Starting with identity and ZTNA makes sense for organizations of any size.

What does Zero Trust cost?

The biggest costs are organizational, not technological. Identity platforms (Azure AD P2, Okta) cost 5-15 Euro per user/month. ZTNA solutions range from 5-20 Euro per user/month. Implementation requires cloud security expertise – either in-house or through consultants. The ROI comes from reduced breach costs and simplified remote access.

Does Zero Trust replace firewalls?

No, it complements them. Firewalls remain essential for perimeter protection, DDoS mitigation, and traffic filtering. Zero Trust shifts the focus from network perimeter to identity and workload – but network security remains a layer in the defense-in-depth model.

Header Image Source: Pexels / Matias Mango

Also available in

A magazine by Evernine Media GmbH