Every security vendor in existence now claims to sell "zero trust." Firewalls are zero trust. VPNs are zero trust. Endpoint agents are zero trust. If you listened to the marketing, you would think zero trust is a product you can buy, install on a Thursday afternoon, and check off your compliance list.

It is not. Zero trust is an architectural philosophy and a set of design principles that fundamentally change how you think about network security. It cannot be purchased. It must be built, and building it requires understanding what it actually is, where the concept came from, and how real organizations have implemented it.

This article cuts through the noise. We will cover the actual NIST 800-207 principles, practical implementation across the five core pillars, common mistakes organizations make, and real-world examples from Google BeyondCorp and the CISA Zero Trust Maturity Model. If you are an engineer, architect, or CTO evaluating zero trust for your organization, this is the technical grounding you need.

Where Zero Trust Came From

The term "zero trust" was coined by Forrester analyst John Kindervag in 2010.[1] The core insight was simple but radical: the traditional network security model, which assumes everything inside the corporate network is trusted and everything outside is untrusted, is fundamentally broken.

That model worked when all your employees were in one building, all your servers were in one data center, and the "perimeter" was a physical thing you could draw a line around. It does not work when your employees work from home, your infrastructure is spread across three cloud providers, and your applications are accessed from personal devices in coffee shops around the world.

The traditional perimeter model also fails catastrophically when an attacker gets inside. Once past the firewall, they can move laterally across the network with minimal resistance. This is exactly what happened in the 2013 Target breach (40 million credit card numbers stolen after attackers entered through an HVAC vendor's network access), the 2020 SolarWinds attack (lateral movement across thousands of organizations from a single supply chain compromise), and countless other incidents where "inside the perimeter" meant "trusted by default."

Zero trust starts from a different premise: never trust, always verify. No user, device, application, or network flow is inherently trusted, regardless of where it is located. Every access request is authenticated, authorized, and encrypted. Every session is continuously validated.

The NIST 800-207 Framework

In August 2020, NIST published Special Publication 800-207, "Zero Trust Architecture," which formalized the concept into a set of principles and deployment models.[2] This document is the closest thing we have to a vendor-neutral, authoritative definition of zero trust. If a vendor claims their product is "zero trust" but cannot map their capabilities to NIST 800-207, be skeptical.

The seven tenets of zero trust (per NIST)

  1. All data sources and computing services are considered resources. This is not just about servers and databases. SaaS applications, IoT devices, employee phones, CI/CD pipelines, and APIs are all resources that need to be protected.
  2. All communication is secured regardless of network location. Traffic inside the corporate network gets the same encryption and authentication as traffic from outside. Being on the "internal" network grants no implicit trust.
  3. Access to individual enterprise resources is granted on a per-session basis. Authentication for one resource does not grant access to another. Each session is independently evaluated.
  4. Access to resources is determined by dynamic policy. Access decisions consider the identity of the requester, the state of the device, behavioral patterns, and environmental conditions (time of day, location, etc.), not just a static username and password.
  5. The enterprise monitors and measures the integrity and security posture of all owned and associated assets. No device is inherently trusted. Devices are continuously assessed for patch level, configuration compliance, and security posture before and during access.
  6. All resource authentication and authorization are dynamic and strictly enforced before access is allowed. This means continuous re-evaluation, not just a one-time check at login.
  7. The enterprise collects as much information as possible about the current state of assets, network infrastructure, and communications, and uses it to improve its security posture. Logging, monitoring, and analytics are core components, not optional add-ons.

Key takeaway: Zero trust is not about removing trust entirely. It is about removing implicit trust and replacing it with explicit, continuously verified trust based on multiple signals. Every access decision is a calculated risk decision based on real-time context.

The Five Pillars of Implementation

The CISA Zero Trust Maturity Model (updated in 2023) organizes zero trust implementation into five pillars: Identity, Devices, Networks, Applications and Workloads, and Data.[3] Each pillar has a maturity progression from Traditional to Advanced to Optimal. Let us break down what practical implementation looks like in each one.

Pillar 1: Identity

Identity is the foundation of zero trust. If you cannot reliably verify who (or what) is making an access request, nothing else matters.

Practical implementation:

Pillar 2: Devices

In a zero trust model, a valid user on a compromised device is still a threat. Device posture must be assessed continuously.

Practical implementation:

Pillar 3: Networks

This is where the biggest shift from traditional security happens. In the perimeter model, the network is the trust boundary. In zero trust, the network is untrusted by default.

Practical implementation:

Pillar 4: Applications and Workloads

Applications are where your business logic and data live. Zero trust at the application layer means verifying access at the application level, not relying on network location as a proxy for authorization.

Practical implementation:

Pillar 5: Data

Data is what attackers are ultimately after. Zero trust data protection means classifying, encrypting, and controlling access to data at a granular level.

Practical implementation:

Lessons from Google BeyondCorp

Google's BeyondCorp initiative, launched internally in 2011 and published in a series of papers starting in 2014, is the most well-documented large-scale zero trust implementation.[7] It was born from a real incident: the 2009 Operation Aurora attacks, where Chinese state-sponsored hackers compromised Google's internal network. Google decided that the perimeter model had failed and committed to eliminating implicit network trust entirely.

What Google actually did

Google eventually productized BeyondCorp as BeyondCorp Enterprise (now part of Google Cloud's Chrome Enterprise Premium), making the core architecture available to other organizations. But the principles are vendor-neutral and implementable on any platform.[8]

The CISA Zero Trust Maturity Model

In 2023, CISA released version 2.0 of its Zero Trust Maturity Model, providing a structured roadmap for organizations, particularly federal agencies required to comply with Executive Order 14028, but applicable to any organization.[3]

The model defines three maturity levels across the five pillars:

The maturity model is valuable because it gives organizations a realistic assessment framework. You do not need to be "optimal" everywhere on day one. You need to know where you are today, identify the highest-impact improvements, and make measurable progress.

Common Mistakes Organizations Make

Mistake 1: Treating zero trust as a product

This is the most pervasive mistake. A vendor tells you their product "delivers zero trust," you buy it, deploy it, and check the box. But zero trust is not a product. It is an architecture. A single product might address one aspect of zero trust (identity, network access, endpoint security), but no single product covers all five pillars. Buying a ZTNA solution does not make your organization zero trust if you still have flat network segmentation, no device compliance enforcement, and static access policies.

Mistake 2: Boiling the ocean

Some organizations try to implement zero trust across all pillars, all systems, and all users simultaneously. This is a recipe for failure. The scope is too large, the change management burden is too heavy, and the organization loses momentum. Google took years to implement BeyondCorp. Start with the pillar that addresses your most critical risk. For most organizations, that is identity. Get SSO, MFA, and conditional access right first. Then expand to device posture, then network segmentation, and so on.

Mistake 3: Ignoring the user experience

If your zero trust implementation adds significant friction to employees' daily work, they will find workarounds. And workarounds are security gaps. The best zero trust implementations are invisible to users most of the time. Conditional access policies should challenge users only when risk signals indicate something unusual. Device compliance should be automated, not manual. SSO should reduce the number of logins, not increase them. If users are complaining about security friction, your implementation needs work.

Mistake 4: Forgetting about non-human identities

Service accounts, API keys, CI/CD pipelines, Kubernetes service meshes, machine-to-machine communication. These "non-human identities" often outnumber human users by 10:1 or more. A 2023 report from Astrix Security found that the average enterprise has 45 non-human identities for every human employee.[9] If your zero trust implementation only addresses human users, you have left a massive attack surface unprotected. Non-human identities need the same rigor: short-lived credentials, least-privilege access, continuous monitoring, and automatic rotation.

Mistake 5: No visibility or monitoring

Zero trust requires comprehensive logging and monitoring to work. If you cannot see every authentication event, every access decision, and every network flow, you cannot verify trust continuously. Invest in a SIEM (Splunk, Microsoft Sentinel, Google Chronicle) or security data lake that aggregates logs from your IdP, endpoints, network, applications, and cloud infrastructure. Build detections for anomalous access patterns: impossible travel, unusual access times, privilege escalation, and lateral movement indicators.

Practical Implementation Roadmap for Cloud-Native Companies

If you are a cloud-native company (SaaS, infrastructure on AWS/GCP/Azure, remote workforce), here is a realistic implementation roadmap. This is not theoretical. This is the sequence we recommend to clients and the approach that yields the fastest risk reduction.

Phase 1: Identity foundation (Months 1-3)

Phase 2: Device and endpoint security (Months 3-6)

Phase 3: Network segmentation (Months 6-12)

Phase 4: Application and data protection (Months 12-18)

Phase 5: Continuous monitoring and optimization (Ongoing)

What Zero Trust Means for Cloud-Native Architecture

Cloud-native companies have both advantages and challenges when it comes to zero trust. The advantages: cloud providers offer rich identity, networking, and monitoring primitives that make zero trust implementation easier than in legacy on-premises environments. The challenges: the dynamic, ephemeral nature of cloud-native infrastructure (containers, serverless, auto-scaling) means the attack surface is constantly changing.

For cloud-native organizations, zero trust is less about replacing an existing perimeter and more about ensuring you never build one in the first place. If your Kubernetes cluster uses network policies from day one, your services authenticate each other with mTLS from day one, and your developers never have standing access to production from day one, you are building zero trust into the architecture rather than retrofitting it.

This is the real promise of zero trust for modern companies. It is not about adding security on top of your architecture. It is about making security an intrinsic property of your architecture. Every design decision, from how services discover each other to how data flows between regions, is an opportunity to embed zero trust principles.

The honest assessment: Zero trust is not a destination. It is a direction. No organization is fully zero trust. Even Google, the originator of BeyondCorp, continues to evolve its implementation. The value is in the journey: each step toward zero trust measurably reduces your attack surface and limits the blast radius of incidents that do occur.[10]


The Bottom Line

Zero trust is not a product you buy. It is not a checkbox on a compliance form. It is a fundamental rethinking of how access and trust work in your organization.

The core principles are straightforward: verify explicitly, use least-privilege access, and assume breach. The implementation is a multi-year journey across five pillars: identity, devices, networks, applications, and data. The most successful implementations start with identity (get SSO and MFA right), expand incrementally (device posture, then network segmentation, then application-level controls), and invest heavily in visibility and monitoring.

If a vendor tells you their product "is zero trust," ask them which NIST 800-207 tenets it addresses, which CISA maturity model pillars it covers, and what it does not do. A good vendor will give you a straight answer. A bad one will change the subject.

Zero trust done well makes your organization meaningfully more resilient. Zero trust done poorly is expensive shelfware with a buzzword label. The difference is in the architecture, not the marketing.

Sources

  1. Forrester Research, John Kindervag, "No More Chewy Centers: Introducing The Zero Trust Model Of Information Security" (2010) - https://www.forrester.com/report/no-more-chewy-centers-introducing-the-zero-trust-model-of-information-security/RES56682
  2. NIST, "SP 800-207: Zero Trust Architecture" (August 2020) - https://csrc.nist.gov/publications/detail/sp/800-207/final
  3. CISA, "Zero Trust Maturity Model v2.0" (April 2023) - https://www.cisa.gov/zero-trust-maturity-model
  4. SPIFFE/SPIRE, "Secure Production Identity Framework for Everyone" - https://spiffe.io/
  5. Illumio, "The Definitive Guide to Microsegmentation" - https://www.illumio.com/resource-center/research-report/microsegmentation-guide
  6. The White House, "Executive Order 14028: Improving the Nation's Cybersecurity" (May 2021) - https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
  7. Google, "BeyondCorp: A New Approach to Enterprise Security" (2014) - https://research.google/pubs/pub43231/
  8. Google Cloud, "BeyondCorp Enterprise / Chrome Enterprise Premium" - https://cloud.google.com/beyondcorp-enterprise
  9. Astrix Security, "The State of Non-Human Identity Security 2023" - https://astrix.security/research/
  10. Google, "BeyondCorp: Design to Deployment at Google" (2016) - https://research.google/pubs/pub44860/

Ready to Assess Your Zero Trust Maturity?

We help organizations evaluate their current security architecture against zero trust principles and build practical, phased implementation roadmaps. No buzzwords, just results.

Book a Consultation Our Services
-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.