Zero Trust Security

Zero Trust Network Architecture: Principles & Implementation Guide 2026

16 min read·

The traditional castle-and-moat network perimeter is dead. Remote work, cloud workloads, and supply-chain attacks have dissolved the boundary between trusted and untrusted. Zero Trust is the architectural response — a model where network location confers no trust, and every access request is verified from first principles. This guide explains what Zero Trust means in practice and how to implement it.

Definition

Zero Trust network architecture (ZTNA) is a security model based on the principle "never trust, always verify." Unlike traditional perimeter security, Zero Trust assumes that threats exist both inside and outside the network. Every user, device, and network connection must be authenticated, authorised, and continuously validated before accessing any resource.

The 3 Core Zero Trust Principles

Principle 01

Verify Explicitly

Every access request must be authenticated and authorised using all available signals — user identity, device health, location, service being accessed, and data classification. No implicit trust is granted based on network location, IP address, or prior authentication. A user authenticated at 9am is re-evaluated at 2pm if risk signals change.

Principle 02

Least Privilege Access

Users and workloads receive only the minimum permissions needed to perform their function — and only for as long as they need them. Just-in-time (JIT) access replaces standing privileged accounts. Privileged identity management (PIM) gates elevation. Access is scoped to the specific application or data set, never to the entire network segment.

Principle 03

Assume Breach

Design the network and policies as if an attacker is already inside. Encrypt all traffic, including east-west. Segment workloads so that a compromised host cannot reach other hosts without traversing an inspection point. Collect telemetry from every network flow, access attempt, and configuration change. Minimise the blast radius of any incident.

Traditional Perimeter Security vs Zero Trust

The shift from perimeter to Zero Trust changes every assumption in network design. Understanding the contrasts makes it clear why the traditional model fails against modern threat actors and why compliance frameworks increasingly mandate Zero Trust controls.

DimensionTraditional PerimeterZero Trust
Trust modelImplicit trust for everything inside the perimeterNo implicit trust — every request verified regardless of location
Access approachNetwork access grants access to all resources on that segmentApplication-level access only — user sees only what they are authorised to use
Lateral movement riskHigh — once inside, attackers move freely east-westLow — microsegmentation stops east-west propagation at every workload boundary
Remote accessVPN extends the trusted network perimeter to the endpointZTNA proxy grants access only to specific apps after identity and posture check
Identity verificationAuthentication at perimeter only (VPN login, corporate Wi-Fi join)Continuous verification — identity, device health, behaviour, risk score
EncryptionEncrypted north-south; east-west often unencrypted inside the LANAll traffic encrypted, including east-west server-to-server flows
Compliance suitabilityIncreasingly difficult to satisfy modern compliance requirementsAligns with NIST SP 800-207, Cyber Essentials Plus, ISO 27001, PCI-DSS v4

Zero Trust Network Segmentation: Microsegmentation vs Macro-Segmentation

Network segmentation in a Zero Trust model operates at two levels. Both are required — they address different threat scenarios and operate at different layers of the stack.

Macro-Segmentation (VLAN / Zone Based)

Foundation layer

Traditional security zones (DMZ, trusted internal, restricted, management) implemented with VLANs and next-generation firewalls. Macro-segmentation prevents broad lateral movement between major zones. It is the first and largest boundary in the Zero Trust model.

Microsegmentation (Workload Level)

Zero Trust core

Policy applied at the individual workload level — each server, VM, container, or application has its own access policy specifying which other workloads may communicate with it, on which protocols and ports. Implemented via host-based firewall policy, SDN overlay, or service mesh. Stops a compromised web server from reaching the database on port 5432 even within the same VLAN.

Software-Defined Perimeters (SDP)

Advanced layer

A software-defined perimeter makes resources invisible to the network until a user or device successfully authenticates. The resource does not respond to unauthenticated connection attempts — it is not merely blocked, it is invisible. SDP is the network expression of the "assume breach" principle applied to infrastructure exposure.

Zero Trust Implementation Roadmap

Zero Trust is not a product you buy — it is an architectural journey. John Kindervag, who coined the term, describes a five-step methodology that applies to any organisation regardless of size or existing infrastructure.

1

Map All Data Flows

You cannot protect what you cannot see. Document every data flow in the network: which systems communicate, on which protocols and ports, and why. This mapping reveals unexpected flows, shadow IT, and compliance-relevant data paths (e.g., PHI or cardholder data traversing unexpected systems). Automated network discovery tools accelerate this step.

2

Define Protect Surfaces

Rather than trying to reduce a vast attack surface, Zero Trust inverts the approach — identify your most sensitive data, applications, and services (the "protect surfaces") and focus controls there. Protect surfaces are small, well-defined, and specific: the payment processing application, the HR database, the backup infrastructure. Define one or more protect surfaces per project phase.

3

Architect the Network Around Protect Surfaces

Place a next-generation firewall (the "segmentation gateway" in Kindervag's terminology) as close to the protect surface as possible. Define a microperimeter around the protect surface. Only traffic that explicitly matches a defined policy — authenticated user or system, specific protocol and port, legitimate business need — is permitted to cross the microperimeter.

4

Create Zero Trust Policy

Write access policies that answer: who needs access to the protect surface, from which devices, from which locations, using which applications, and at what times? Policies should be as specific as possible. Use the Kipling Method — Who, What, When, Where, Why, and How — to document every access rule. All access should default-deny; permissions are granted explicitly and reviewed regularly.

5

Monitor, Maintain, and Iterate

Zero Trust depends on continuous monitoring. Collect telemetry from every network flow, authentication event, and access decision. Feed it into a SIEM for anomaly detection. Review protect surface policies quarterly or after any significant change. Zero Trust is never "done" — threat landscapes evolve and the policy must evolve with them.

Zero Trust and Compliance Frameworks

Zero Trust principles are now embedded in major security standards. Implementing Zero Trust is increasingly not just best practice but a compliance requirement.

FrameworkZero Trust RequirementKey Control
NIST SP 800-207The definitive Zero Trust Architecture standard — defines components, deployment models, and migration pathsPolicy Decision Point + Policy Enforcement Point architecture
Cyber Essentials PlusRequires network segmentation, least privilege access, and MFA for all internet-accessible systemsBoundary firewalls, access control, patch management
ISO 27001:2022Annex A 8.20 Networks security, 8.22 Segregation of networks, 5.15 Access controlDocumented network segmentation policy with access rules
PCI-DSS v4.0Requires CDE isolation, network security controls between all network zones, and authenticated access to all system componentsNetwork security controls, MFA for all non-console CDE access
HIPAA Security RuleRequires access controls limiting PHI access to minimum necessary, and audit controls for PHI system accessTechnical access controls, audit log integrity, encryption in transit

Frequently Asked Questions

What is Zero Trust network architecture?

Zero Trust network architecture (ZTNA) is a security model based on the principle "never trust, always verify." Unlike traditional perimeter security, Zero Trust assumes that threats exist both inside and outside the network. Every user, device, and connection must be authenticated, authorised, and continuously validated before accessing any resource.

What is the difference between Zero Trust and VPN?

A VPN grants broad network access once a user authenticates — it extends the trusted network perimeter to the remote user. Zero Trust does the opposite: it grants access only to specific applications or services based on verified identity and device posture, never to the whole network. Zero Trust eliminates the lateral movement risk that VPNs create by giving users full network-level access.

How do I implement Zero Trust?

The five implementation steps are: (1) map all data flows, (2) define protect surfaces (the most sensitive systems), (3) architect the network around those protect surfaces with microsegmentation, (4) create Zero Trust access policies requiring verified identity and device posture for every access request, and (5) monitor and continuously improve based on telemetry.

Is Zero Trust the same as microsegmentation?

No — microsegmentation is one component of a Zero Trust architecture, not the whole model. Microsegmentation divides the network into small isolated segments to limit lateral movement. Zero Trust also includes identity verification, device health checking, least-privilege access policies, and continuous monitoring. You can have microsegmentation without Zero Trust, but Zero Trust requires microsegmentation.

Design your Zero Trust topology

VP Compass includes a Zero Trust overlay mode — map your protect surfaces, microsegmentation boundaries, and identity perimeters visually.

Start designing your network topology free →
← Back to Blog