Zero Trust is one of the most overused terms in cybersecurity. Every vendor claims their product delivers it. Most do not. The confusion stems from a fundamental misunderstanding: Zero Trust is not a product you buy — it is an architectural principle you implement across your environment over time.
This guide cuts through the marketing and gives you a practical, phased approach to implementing Zero Trust Network Access (ZTNA) in a real UK business environment.
What Zero Trust Actually Means
The traditional network security model assumed that everything inside the corporate network perimeter was trustworthy. VPNs extended that perimeter to remote workers. The problem: once an attacker gets inside — through a phishing email, a compromised credential, or a vulnerable device — they can move laterally across the network with minimal friction.
Zero Trust replaces the perimeter model with a simple principle: no user, device, or application is trusted by default, regardless of network location. Every access request must be authenticated, authorised, and continuously validated.
In practice, this means:
- Identity is the new perimeter — strong authentication on every access request
- Least-privilege access — users and devices get only the access they need for the specific task
- Micro-segmentation — network segments are isolated so lateral movement is blocked
- Continuous verification — trust is not granted once and held indefinitely; it is re-evaluated continuously
- Assume breach — design your controls assuming an attacker is already inside
The Five Pillars of Zero Trust
1. Identity
Every user must be strongly authenticated before accessing any resource. This means MFA as a minimum — ideally phishing-resistant MFA using FIDO2/WebAuthn hardware keys or passkeys rather than SMS or TOTP codes. Identity providers like Microsoft Entra ID (formerly Azure AD) or Okta provide the foundation, with Conditional Access policies enforcing context-aware authentication (device compliance, location, risk score).
2. Devices
Only managed, compliant devices should be permitted to access corporate resources. Device compliance policies check for: current OS patches, active EDR agent, disk encryption, screen lock, and absence of known malware. Non-compliant devices are blocked or quarantined. Microsoft Intune and Jamf are the standard tools for this in UK business environments.
3. Network
Replace broad VPN access with application-specific ZTNA tunnels. Instead of giving a remote user access to the entire corporate network, ZTNA grants access only to the specific application they need, for the duration they need it. Zscaler Private Access, Microsoft Entra Private Access, and Cloudflare Access are the leading ZTNA platforms. Network micro-segmentation using VLANs, software-defined networking, or cloud security groups limits lateral movement within the environment.
4. Applications
Applications should enforce their own access controls rather than relying solely on network-level controls. This means SSO integration, role-based access control (RBAC), and session monitoring. Privileged access to sensitive applications should use just-in-time (JIT) provisioning — access is granted for a specific window and automatically revoked.
5. Data
Data classification and data loss prevention (DLP) controls ensure that sensitive data cannot be exfiltrated even by authenticated users. Microsoft Purview, Symantec DLP, and Forcepoint are common tools. Encryption at rest and in transit is non-negotiable.
A Phased Implementation Roadmap
Phase 1: Identity Foundation (Weeks 1–4)
- Deploy phishing-resistant MFA across all users — prioritise admin accounts first
- Implement Conditional Access policies: block legacy authentication, require compliant devices for sensitive apps
- Audit and clean up user accounts — remove stale accounts, reduce admin privileges
- Enable identity protection and risky sign-in policies
Phase 2: Device Compliance (Weeks 4–8)
- Enrol all devices in MDM (Intune/Jamf)
- Define and enforce device compliance policies
- Deploy EDR on all endpoints
- Enable disk encryption (BitLocker/FileVault)
- Block non-compliant devices from accessing corporate resources
Phase 3: Network Segmentation (Weeks 8–16)
- Audit current network topology and identify flat network segments
- Implement VLAN segmentation for servers, workstations, IoT, and guest networks
- Deploy ZTNA for remote access — begin replacing VPN for application access
- Implement east-west traffic monitoring to detect lateral movement
Phase 4: Application and Data Controls (Weeks 16–24)
- Implement SSO for all business applications
- Deploy JIT privileged access for admin functions
- Classify sensitive data and implement DLP policies
- Enable session monitoring for privileged access
Common Mistakes to Avoid
Treating Zero Trust as a one-time project. It is an ongoing programme. Threat actors evolve, your environment changes, and your controls must keep pace.
Starting with network segmentation instead of identity. Identity is the highest-leverage starting point. Most breaches involve compromised credentials — fixing identity first delivers the most immediate risk reduction.
Deploying ZTNA without device compliance. A ZTNA solution that allows access from any device — including personal, unmanaged devices — provides limited protection. Device compliance is a prerequisite.
Ignoring service accounts and non-human identities. Service accounts, API keys, and automation credentials are frequently overlooked and are a common attack vector. Apply the same least-privilege principles to non-human identities.
Baycop designs and implements Zero Trust architectures for UK businesses. Book a free Zero Trust readiness assessment to understand where your gaps are and get a prioritised remediation roadmap.