Valtik Studios
Back to blog
Zero TrusthighUpdated 2026-04-1729 min

Zero Trust Implementation: The Complete Multi-Year Playbook

You don't need Zero Trust. You need better identity, better segmentation, better device management, and better application access control. Zero Trust is what marketing calls that bundle. This is the complete ZTA implementation playbook. Pre-implementation assessment. Year-by-year roadmap. Five-pillar maturity model. Vendor shootout (Microsoft, Okta, Cloudflare, Zscaler, Netskope, Palo Alto, Cisco, JumpCloud). Seven anti-patterns that make programs fail.

TT
Tre Trebucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.

I'll say the thing most Zero Trust consultants won't

You don't need Zero Trust. You need better identity, better segmentation, better device management, and better application access control. "Zero Trust" is what marketing departments call that bundle so they can sell a brand-name product.

I've been watching Zero Trust consulting engagements land in client environments for five years. The ones that work are the ones where the architects treat ZTA as a set of principles applied to specific problems, sequenced based on maturity. The ones that fail are the ones where the vendor drew a diagram, sold the client on the diagram, and implemented the diagram without considering whether the diagram matched reality.

This post is the complete Zero Trust implementation playbook we use when clients ask us to help architect and execute a program. It's not the 20-page vendor PDF. It's a multi-year plan with concrete milestones, specific tooling, and honest about where vendors oversell.

What Zero Trust actually is

NIST SP 800-207 defines Zero Trust Architecture around seven core tenets. The short version:

  1. All data sources and computing services are considered resources.
  2. All communication is secured regardless of network location.
  3. Access to individual enterprise resources is granted on a per-session basis.
  4. Access is determined by dynamic policy including observed client identity, state, and request attributes.
  5. Enterprise monitors and measures the integrity and security posture of all assets.
  6. All resource authentication and authorization is dynamic and strictly enforced before access is allowed.
  7. Enterprise collects as much information as possible about assets, infrastructure, network, and communications and uses it to improve security posture.

In practice, this translates to a small number of design principles:

  • Identity is the primary control plane, not the network.
  • Every access request validates identity, device, session context, and resource sensitivity.
  • No implicit trust based on network location.
  • Continuous verification, not one-time authentication.
  • Least privilege, enforced dynamically.
  • Comprehensive logging of every access decision.

What Zero Trust isn't

  • A product you buy.
  • A network architecture (though networks change as part of it).
  • A VPN replacement (though some deployments start there).
  • A silver bullet against breaches.
  • An overnight transformation.
  • Something you finish. It's an ongoing posture.

If your vendor is selling "Zero Trust in 90 days," they're selling you one narrow slice (usually ZTNA) rebranded as "Zero Trust." Not the same.

The five pillars

CISA's Zero Trust Maturity Model defines five pillars. This is the structure we use for planning.

1. Identity

Who is accessing. Strongly authenticated. Dynamically evaluated.

Capabilities:

  • Centralized identity provider (Okta, Microsoft Entra, Google Identity, Ping, JumpCloud)
  • Phishing-resistant MFA (FIDO2, passkeys, platform authenticators)
  • Risk-based authentication
  • Just-in-time privilege elevation
  • Continuous session evaluation
  • Identity governance with periodic access reviews

2. Devices

What is accessing. Known. Healthy. Compliant.

Capabilities:

  • Device identity (certificate or MDM enrollment)
  • Device compliance (EDR installed, OS patched, disk encrypted)
  • Real-time device posture evaluation at authentication time
  • Device attestation for sensitive access

3. Networks

How the access request travels. Encrypted. Segmented. Logged.

Capabilities:

  • TLS everywhere
  • Application-level access (not network-level)
  • Microsegmentation
  • Encrypted east-west traffic
  • DNS-based security

4. Applications and workloads

What is being accessed. Protected at the resource level.

Capabilities:

  • Application-level authorization (not just authenticated network access)
  • API security
  • Workload identity (for service-to-service)
  • Continuous application security testing
  • Container security

5. Data

What matters and what's being protected.

Capabilities:

  • Data classification
  • Encryption at rest and in transit
  • Data access governance
  • Data loss prevention
  • Rights management / DRM

Maturity varies across pillars. Most organizations are mature on Identity, medium on Devices and Networks, immature on Applications and Data.

The maturity model

CISA's Zero Trust Maturity Model has four levels:

  • Traditional. Perimeter-based, implicit trust inside the network.
  • Initial. Some identity + device controls exist but are point solutions.
  • Advanced. Identity and device integrated, conditional access mature, microsegmentation beginning.
  • Optimal. Full dynamic policy, continuous verification across all pillars.

Most organizations we work with are Traditional or Initial. Moving from Traditional to Advanced is a 3-5 year program. Moving to Optimal is an ongoing refinement that doesn't have a clean endpoint.

Pre-implementation assessment

Before investing in new technology, baseline where you are.

Identity baseline

  • Do you have a centralized IdP? If yes, what percentage of apps use SSO?
  • What MFA methods are deployed? What percentage of users + apps use phishing-resistant MFA?
  • Is there Conditional Access? If yes, what policies? What exceptions exist?
  • Privileged access management? Just-in-time elevation? Separate admin accounts?

Device baseline

  • MDM coverage? Device compliance enforced at authentication?
  • EDR coverage?
  • Device certificate or attestation at access time?
  • BYOD policy and technical enforcement?

Network baseline

  • How flat is the network? Segmentation present?
  • East-west encryption?
  • Internal DNS filtering? TLS interception with visibility?
  • Any legacy protocols (SMB v1, NTLMv1, unencrypted RPC)?

Application baseline

  • Which apps are accessed via VPN vs. direct internet?
  • Application-level authorization or just authenticated network access?
  • API security posture?
  • SaaS applications connected via SSO?

Data baseline

  • Data classification in place?
  • Where does regulated data live?
  • Data loss prevention covering sensitive flows?
  • Data access governance (who has access to what)?

The assessment produces a maturity score per pillar. The scores drive the roadmap.

The roadmap

Year-by-year plan for a typical mid-market organization (500-5000 employees) moving from Traditional to Advanced.

Year 1. Identity foundation

Quarter 1.

  • Centralize identity via IdP. Migrate away from any legacy auth.
  • Deploy phishing-resistant MFA on privileged accounts (hardware keys or platform authenticators).
  • Enable Conditional Access (or equivalent) on every sensitive app.

Quarter 2.

  • Expand MFA to all users (accepting non-phishing-resistant for general population as interim).
  • Implement break-glass accounts with strong controls.
  • Begin privileged access separation (admin accounts distinct from user accounts).

Quarter 3.

  • Deploy SSO to all major SaaS.
  • Begin identity governance (access reviews, automated provisioning/deprovisioning).
  • Remove any legacy password-only access paths.

Quarter 4.

  • Deploy Just-in-Time privilege elevation for admin functions.
  • Risk-based authentication policies.
  • Entra ID P2 / Okta Identity Engine / equivalent for risk signals.
  • Begin vendor access cleanup.

End of Year 1. Identity is a real control plane. Phishing-resistant MFA on privileged access. Strong baseline for everything else.

Year 2. Device + Network

Quarter 1.

  • MDM rollout to every endpoint (Intune, Jamf, Kandji, Mosyle, etc.).
  • Device compliance policies enforced.
  • EDR on every managed device.

Quarter 2.

  • Device compliance integrated with Conditional Access. Non-compliant devices can't access sensitive resources.
  • Device certificates for stronger identity binding.
  • BYOD strategy formalized.

Quarter 3.

  • ZTNA deployment (Cloudflare Access, Zscaler Private Access, Netskope Private Access, or Microsoft Entra Private Access).
  • Traditional VPN deprecated for new applications.
  • Legacy apps migrated to ZTNA where possible.

Quarter 4.

  • Microsegmentation project begins.
  • East-west traffic reduction and encryption.
  • Network-level ACLs tightened.

End of Year 2. Device is a real control. ZTNA replaces VPN. Network segmentation project underway.

Year 3. Applications + Data

Quarter 1.

  • Application-level authorization for critical apps.
  • API gateway with proper auth + rate limiting + logging.
  • Workload identity for service-to-service (managed identities, IRSA, workload identity).

Quarter 2.

  • Data classification project.
  • DLP deployment on email, endpoints, SaaS.
  • Sensitive data inventory.

Quarter 3.

  • Data access governance via privileged access management for data.
  • Microsegmentation completed for critical apps.

Quarter 4.

  • Rights management / DRM for most sensitive data.
  • Cross-pillar policy engine maturing.

End of Year 3. Advanced maturity on all five pillars. Approaching Optimal.

Years 4-5. Optimization

Refinement. Automation. Operational excellence. Continuous improvement based on observed threats.

The vendor landscape

Realistic evaluation of the major Zero Trust platforms.

Microsoft (Entra ID + Intune + Defender XDR + Purview)

Pros: Tightly integrated if you're M365-centric. Cost-effective for Microsoft shops. Conditional Access is excellent.

Cons: Less good outside Microsoft ecosystem. Third-party SaaS integration via SAML/OIDC works but feels bolted on.

Best for: M365-centric organizations, Fortune 500 Microsoft shops.

Okta

Pros: Best-in-class identity. Broad integration catalog. Neutral (not tied to a cloud).

Cons: Increasingly expensive for growing scope. Identity-only (no device, network, application layers).

Best for: Organizations with heavy SaaS usage + no strong cloud preference.

Cloudflare (Cloudflare One)

Pros: Modern infrastructure. ZTNA + SWG + CASB integrated. Reasonable pricing.

Cons: Identity layer is thin compared to Okta/Entra. Product still maturing in some areas.

Best for: Mid-market, new builds, organizations consolidating on Cloudflare.

Zscaler

Pros: Mature SSE platform. Enterprise scale. Strong ZTNA.

Cons: Expensive. Proprietary deployment model. Migration friction.

Best for: Large enterprises, traditional Fortune 500.

Netskope

Pros: Strong CASB/SSE. Good data protection.

Cons: Similar scale/complexity to Zscaler.

Best for: Enterprises with heavy SaaS + strong data protection needs.

Palo Alto Networks (Prisma Access / Access)

Pros: Integrated with Palo Alto firewalls. Strong in organizations that already use Palo Alto.

Cons: Expensive. Sales motion can be heavy.

Best for: Palo Alto-centric organizations.

Cisco (Duo + Secure Access + others)

Pros: Duo is excellent MFA. Broad portfolio.

Cons: Zero Trust story is fragmented across products.

Best for: Cisco-centric organizations.

JumpCloud

Pros: Cost-effective identity. Small business focused.

Cons: Less enterprise depth.

Best for: Small + mid-market organizations.

The anti-patterns

Seven Zero Trust implementations we've seen fail:

1. Big-bang deployment

Organization buys the full Zero Trust platform, attempts to migrate everything in 6 months, breaks business functionality, gets pushback from business units, project stalls, ZTNA becomes an expensive VPN replacement with 40% of users still on the VPN.

Fix: Incremental rollout starting with non-critical apps. Prove value. Expand.

2. Identity-only implementation

Organization deploys strong identity, declares victory. Device, network, application, and data layers unchanged. Compromised credential still gives the attacker everything the legitimate user has.

Fix: Multi-pillar approach. Identity is the start, not the end.

3. Policy without enforcement

Conditional Access policies exist. Exceptions accumulate. Every policy has a dozen exclusions. Effective policy enforcement approaches zero.

Fix: Quarterly exception review. Documented justification for every exception. Expiration dates. Zero-exception asymptote.

4. No network visibility

Zero Trust policies assume you know what's on your network. Organization has no asset inventory, no device posture, no network monitoring. Policies enforced on 40% of traffic.

Fix: Asset inventory + monitoring first. Can't enforce what you can't see.

5. ZTNA as VPN replacement without actual zero-trust

Organization deploys ZTNA to replace VPN. Users authenticate once, gain network-level access to everything, no per-resource authorization. Same implicit trust model as VPN, different vendor.

Fix: Per-application access, not per-user network access. Enforce at the resource.

6. Legacy exception drift

Organization grants "temporary" exceptions for legacy apps. Exceptions never expire. Three years later, 30% of apps are on legacy exception paths.

Fix: Explicit migration plan for every legacy app. Sunset dates.

7. Vendor lock-in as strategy

Organization commits fully to one vendor's Zero Trust platform. Vendor pricing increases 40% annually. Migration off is prohibitive.

Fix: Standards-based design. Openness over proprietary integration. Identity layer especially should be portable.

The metrics that matter

How you measure Zero Trust program progress.

Identity metrics

  • Percentage of apps behind SSO
  • Percentage of users with phishing-resistant MFA
  • Mean time to detect compromised credential
  • Privileged access elevation requests + approvals
  • Access review completion rate

Device metrics

  • Percentage of devices under MDM
  • Percentage of devices with compliant posture
  • Non-compliant device access attempts (should trend down)
  • Mean time to detect compromised device

Network metrics

  • Percentage of apps accessed via ZTNA vs. legacy VPN
  • Microsegmentation coverage
  • East-west traffic encryption
  • Unexpected network connections detected

Application metrics

  • Percentage of apps with application-level authorization
  • API gateway coverage
  • Workload identity adoption

Data metrics

  • Sensitive data coverage by classification
  • DLP incident rate
  • Data access review coverage

Track these quarterly. Board reporting uses them.

Where ROI actually comes from

Zero Trust isn't cheap. Where's the return?

  • Reduced breach likelihood. Harder to quantify but real. Compromised credentials no longer automatically yield network-wide access.
  • Reduced breach impact. When breach happens, blast radius is smaller.
  • Reduced operational cost. VPN infrastructure retirement. Consolidated vendor footprint.
  • Improved compliance posture. Multiple regulations (SOC 2, HIPAA, PCI, NYDFS) call out controls that ZTA delivers.
  • Improved user experience. Once mature, ZTNA is faster than VPN. Users notice.
  • Improved audit outcomes. Evidence of access controls is built-in to ZTA logs.

Working with us

We run Zero Trust readiness assessments, architecture reviews, and implementation engagements. Typical engagements:

  • 6-12 week readiness assessment for mid-market organizations
  • Multi-quarter implementation advisory for organizations executing a program
  • Vendor evaluation support
  • Specific deep dives (Conditional Access tuning, microsegmentation planning, ZTNA migration)

We don't sell a Zero Trust product. We help you pick the right products and deploy them well.

Valtik Studios, valtikstudios.com.

zero trustzero trust architectureztnaztanist 800-207cisaidentitysegmentationssecomplete guide

Want us to check your Zero Trust setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.