The NCSC’s zero trust architecture guidance and CISA’s Zero Trust Maturity Model both describe zero trust in terms of pillars or domains that must each be addressed. Organisations that address identity but not devices have users who are continuously verified but on devices that could be compromised. Organisations that address devices but not networks have hardened endpoints communicating over paths that provide no visibility. Zero trust is a system property, not a component property — it requires all seven domains to function at an appropriate maturity level simultaneously.
Pillar 1
Identity — The Primary Security Perimeter
In a zero trust architecture, identity is the control plane. Every request for access is evaluated against the identity making it: who the user is, what groups and roles they belong to, whether they have authenticated strongly, when they last authenticated, and whether their account is behaving consistently with their baseline pattern. Identity includes not just human users but also service accounts, API clients, automated processes, and workloads — every entity that requests access to a resource has an identity that must be managed and verified.
What adequate identity management requires
Phishing-resistant MFA (FIDO2/WebAuthn) for all human users — TOTP-based MFA is increasingly inadequate against adversary-in-the-middle phishing. Passwordless authentication for modern workloads. Centralised identity governance with automated provisioning and deprovisioning. Just-in-time privileged access with time-bounded elevation rather than standing privileges. Regular access reviews and certification. Federated identity for third-party users and partners. Service identity for non-human workloads using short-lived credentials rather than long-lived service account passwords or API keys.
The most common gap found in assessments
Standing privileged access: administrators with permanent elevated privileges whose accounts are high-value targets and whose access is not time-bounded or monitored with sufficient granularity. Service accounts with static long-lived credentials that have not been rotated in months or years. Users who have accumulated role assignments across multiple identity changes without a clean review. Legacy applications that cannot support modern MFA and that retain password-only authentication as a permanent exception.
Pillar 2
Devices — Endpoint Health as an Access Condition
In a perimeter model, devices inside the network are trusted. In a zero trust model, devices must earn trust by demonstrating health: they run a supported OS version, they have current security patches, their endpoint protection is active and up to date, they are enrolled in device management, and they have not exhibited indicators of compromise. Device health is a dynamic attribute of access decisions — a device that was healthy at 9am may not be healthy at 11am after a security tool fails or a suspicious process is detected. Access decisions must reflect current device state, not the state at last login.
What device trust requires
Device inventory with authoritative records of all devices authorised to access organisational resources. MDM/UEM enrolment for managed devices with compliant configuration enforcement. Endpoint Detection and Response (EDR) deployment across all managed endpoints. Device compliance policy that gates access: a device that does not meet the compliance standard (patched, enrolled, EDR active) is denied access to protected resources regardless of the user’s identity. Conditional access policies that enforce device compliance at the identity provider level. BYOD architecture that separates organisational data from personal device storage.
The most common gap found in assessments
Unmanaged devices with full network access: contractor laptops, personal devices used for work, IoT devices, and operational technology systems that are on the network but not enrolled in device management and not subject to compliance policy. These devices have the same network-level access as managed devices because device compliance is not enforced at the network layer. An adversary who compromises an unmanaged device has network access equivalent to a managed endpoint.
Pillar 3
Networks — Microsegmentation Replacing Implicit Trust
A flat network where any authenticated user or device can communicate with any other resource is not a zero trust network regardless of how strong the authentication at the perimeter is. Once an adversary has established a foothold on a single endpoint inside a flat network, they can move laterally to any other resource without encountering additional authentication or authorisation. Microsegmentation divides the network into segments where east-west traffic between segments requires explicit authorisation — a compromised endpoint in the user VLAN cannot directly communicate with a database server in the data tier without traversing a policy enforcement point.
What network zero trust requires
Software-defined perimeter or microsegmentation that restricts east-west traffic between workloads based on identity and policy rather than network topology. Application-layer segmentation: workloads communicate on a per-port, per-protocol basis rather than having full IP-level connectivity. DNS-based and service mesh-based access control for microservices environments. ZTNA (Zero Trust Network Access) to replace VPN for remote access: users connect to specific applications rather than to the network, and their access is brokered by a policy engine that evaluates identity and device health at each connection. Encrypted communications between all workloads, including east-west internal traffic.
The most common gap found in assessments
Flat internal network with VLANs as the only segmentation: VLANs segment broadcast domains, not access control. A compromised endpoint in a VLAN can communicate with any other device in the same VLAN, can attempt connections to other VLANs where firewall rules allow it, and can access network resources that no explicit policy permits because no explicit policy denies them. The implicit allow for intra-VLAN traffic is the lateral movement path that most incident investigations find was used for propagation.
Pillar 4
Applications — Application-Level Access Control
Zero trust access to applications means that users access specific application functions with specific permissions, not that they access a network on which the application resides. The access decision is made at the application layer: this user, on this device, with this current risk score, is authorised to access this specific function of this application, and not any other function they have not been granted. Application-layer access control requires applications to understand identity context — which legacy applications do not — and provides the granularity necessary to implement least-privilege access meaningfully rather than at the coarse level of “can access the application.”
What application zero trust requires
Application integration with the identity provider for authorisation, not just authentication. Role-based and attribute-based access control implemented at the application layer rather than controlled by network location. API security: every API endpoint is an access control boundary with its own authentication and authorisation requirements. Secrets management: applications retrieve credentials from a secrets management system at runtime rather than storing them in configuration files, environment variables, or code. Legacy application proxy: for applications that cannot be modified, an application proxy enforces identity-based access control in front of the application.
The most common gap found in assessments
Internal applications accessible to all authenticated network users: any user with network access can access the application because the application trusts the network rather than verifying the user’s access rights independently. Internal APIs with no authentication: REST APIs on internal servers that require only network access (being on the right network segment) and return sensitive data to any requester. Hardcoded credentials in application code or configuration that cannot be rotated without a code deployment.
Pillar 5
Data — Protection at the Data Layer, Not the Perimeter
Zero trust data protection means that data is protected by controls attached to the data itself — classification, encryption, and access policy that travels with the data rather than being imposed by the perimeter surrounding it. Data in transit between services should be encrypted end-to-end. Data at rest should be encrypted with access to the encryption keys controlled by policy. Sensitive data should be labelled and the label should drive DLP policy, retention policy, and access logging. Data accessed outside the organisational context — on personal devices, in personal cloud storage, in email to external recipients — should trigger the DLP controls that prevent loss rather than relying on the user’s judgment.
What data zero trust requires
Data classification scheme with automated classification tooling that applies sensitivity labels to documents and emails at creation. DLP policies that enforce controls based on classification: classified documents cannot be sent to external email, cannot be uploaded to non-approved cloud storage, cannot be printed on unmanaged devices. Encryption of data at rest in all storage systems, with key management policies that restrict key access to authorised identities. Data access logging at sufficient granularity to detect inappropriate access patterns. Rights management for documents that must remain protected when shared externally.
The most common gap found in assessments
Unclassified sensitive data: most organisations have sensitive data that has never been classified because the classification process was too burdensome or was applied only to new documents. Historical data — the most sensitive data, typically — has no classification labels and is therefore outside all DLP policies. An adversary who exfiltrates a large archive of unclassified historical data may have taken the most sensitive material in the organisation’s possession without triggering any DLP alert.
Pillar 6
Visibility & Analytics — Continuous Monitoring for Dynamic Trust
Zero trust requires that access decisions reflect current context, not the context at the point of authentication. A user who authenticated with strong MFA this morning but whose account then sent 47 emails to an external address with attachments has a different current risk score than when they authenticated. Dynamic trust requires telemetry from all five preceding pillars: identity signals (authentication events, MFA failures, access patterns), device signals (EDR alerts, compliance status changes, unusual processes), network signals (unusual traffic volumes, new connections to uncommon destinations), application signals (unusual data access patterns, privilege escalation attempts), and data signals (DLP alerts, bulk downloads, unusual external sharing). This telemetry must be aggregated and analysed to produce a risk signal that policy enforcement points use in real time.
What visibility and analytics requires
SIEM or XDR platform that aggregates signals from all five other pillars into a unified view. UEBA (User and Entity Behaviour Analytics) that establishes behavioural baselines and detects anomalous deviations. Integration between the analytics platform and the policy enforcement points so that a high-risk signal triggers adaptive access policy (step-up authentication, session termination, access restriction) automatically rather than requiring manual intervention. Log retention and immutability for forensic investigation. Mean time to detect (MTTD) and mean time to respond (MTTR) as tracked operational metrics.
The most common gap found in assessments
Log collection without analysis: organisations collect logs from identity, endpoint, and network systems but do not have the correlation or analytics capability to turn them into actionable signals. The logs exist. The attack is in the logs. No one is reading the logs systematically because there is no SIEM, or the SIEM is not tuned, or the SIEM generates so many alerts that analysts have become alert-fatigued and are dismissing everything. Telemetry without analysis is storage cost, not security capability.
Pillar 7
Automation & Orchestration — Policy Enforcement Without Human Delay
The dynamic access control that zero trust requires cannot be implemented manually. If a high-risk signal requires a human to review and decide whether to terminate a session or restrict access, the decision will arrive minutes or hours after the signal. The adversary will have completed their objective during the response window. Zero trust requires that policy enforcement is automated: defined policies are applied by the policy enforcement point in real time as the risk context changes. This requires the governance to define those policies precisely enough to be implemented in software, and the engineering to implement them reliably without false positive rates that break legitimate business processes.
What automation and orchestration requires
Policy engine that evaluates access requests against current context and enforces the outcome without human intervention. Adaptive access policies: if a user’s risk score exceeds a threshold, require step-up MFA; if it exceeds a higher threshold, terminate active sessions; if a device loses compliance, revoke access immediately. SOAR (Security Orchestration, Automation, and Response) for incident response: playbooks that execute the first N steps of incident response automatically, reducing MTTR for the most common incident types. Infrastructure-as-code for security policy: access policies are defined in version-controlled code, reviewed through the same process as application code, and deployed through tested pipelines.
The most common gap found in assessments
Manual response processes that cannot scale to the alert volume: security operations teams that receive 3,000 alerts per day and have capacity to investigate 50. The 2,950 uninvestigated alerts include the adversary’s activity. Manual response to account takeover indicators that takes hours while the adversary exfiltrates data. No automated revocation of access when an offboarding ticket is raised — departed employees’ accounts remaining active for days or weeks because the deprovisioning process requires manual steps that are not consistently completed.
Pillar 8
Governance & Assurance — Continuous Verification of Control Integrity
Zero trust is not a static architecture but a continuously enforced and continuously validated control system. Governance ensures that the policies, controls, and enforcement mechanisms defined across identity, devices, networks, applications, data, visibility, and automation are not only implemented but remain effective, aligned with organisational risk appetite, and legally compliant over time. Assurance transforms zero trust from a design into an operational reality by validating that controls behave as intended under real-world conditions, including adversarial scenarios, organisational change, and system evolution. Without governance and assurance, zero trust degrades into a collection of point-in-time configurations that drift, weaken, and eventually fail under pressure.
What governance and assurance requires
Formal security governance framework aligned to recognised standards (ISO 27001, NIST, CIS) with clearly defined control ownership and accountability. Continuous control validation through automated testing, red teaming, and adversary simulation (BAS — Breach and Attack Simulation). Policy lifecycle management: definition, approval, implementation, monitoring, and periodic review with measurable effectiveness criteria. Independent audit capability — internal and external — with traceable evidence of control operation. Regulatory alignment for data protection, financial controls, and sector-specific obligations. Metrics-driven oversight: control effectiveness KPIs, risk reduction indicators, and executive-level reporting that ties security posture directly to business risk.
The most common gap found in assessments
Controls assumed to be effective without validation: organisations deploy identity policies, segmentation rules, or DLP configurations and assume they work as designed without testing them against realistic attack paths. Policy drift over time due to exceptions, emergency changes, and undocumented adjustments that accumulate without review. Lack of ownership: no single accountable entity for verifying that a control continues to operate effectively. Compliance treated as a periodic checkbox exercise rather than continuous assurance, resulting in environments that are “compliant on paper” but operationally vulnerable. Absence of adversarial testing means that control failures are first discovered during real incidents rather than controlled simulations.