The castle-and-moat model of network security assumed that once you were inside the walls, you were trusted. VPN in, you’re good. On the corporate network, you’re safe. That assumption was always fragile, and now it’s outright dangerous. Remote work obliterated the perimeter. Cloud services scattered your data across someone else’s infrastructure. Attackers who get past the moat — and they will — move laterally through flat networks with nothing stopping them because everything inside was “trusted.”

Zero Trust flips the model. Nothing is trusted by default. Every access request is verified, regardless of where it comes from. The network location doesn’t grant trust. The device doesn’t grant trust. Even the identity doesn’t grant trust on its own — it’s one factor among many, verified continuously. This isn’t a product you buy. It’s an architecture you build, one protect surface at a time.

DO / DON’T

DO:

DON’T:

Step 1: Identify Your Protect Surfaces

The attack surface is everything exposed — every IP, every port, every application. It’s massive and constantly shifting. The protect surface is the opposite: the specific, critical things you need to defend.

Each protect surface contains one or more of the DAAS elements:

Define each protect surface explicitly. “The customer database” is a protect surface. “The network” is not. NIST SP 800-207 defines Zero Trust architecture and its core tenets — start there for the authoritative framework.

Step 2: Map Transaction Flows

Before you can enforce policy, you need to understand how data flows. For each protect surface, map:

Document these flows. This map becomes the blueprint for your policies. Every allowed transaction flow becomes an explicit rule. Everything else is denied by default. CISA’s Zero Trust Maturity Model provides a staged approach for mapping and implementing these controls across five pillars: identity, devices, networks, applications, and data.

Step 3: Build Your Microperimeters

Each protect surface gets its own microperimeter — a segmentation gateway (next-generation firewall, software-defined perimeter, or identity-aware proxy) placed as close to the protect surface as possible.

Segmentation Gateway Placement

The segmentation gateway sits directly in front of the protect surface, not at the network edge. This is the fundamental architectural shift. In traditional security, the firewall protects the perimeter. In Zero Trust, the policy enforcement point protects the asset.

For a customer database:

Policy Engine + Policy Administrator

NIST SP 800-207 defines two core components:

These can be separate systems or combined in a single platform (many identity-aware proxies combine both functions).

Step 4: Create Kipling Method Policies

For each microperimeter, define policies using the Kipling Method — who, what, when, where, why, and how:

Element Policy Question
Who Which identity is requesting access? Verified how?
What Which application or resource is being accessed?
When Is this within the allowed time window?
Where Where is the request originating? Expected location?
Why What business function justifies this access?
How What protocol and method is being used?

Default deny everything. Then add explicit allow rules for each documented transaction flow. If a flow wasn’t mapped in Step 2, it doesn’t get a rule.

Contextual, Continuous Verification

Trust isn’t binary — it’s a spectrum recalculated in real time:

Adaptive access policies adjust in real time. A request from a managed device on the corporate network with fresh MFA might get full access. The same identity from an unmanaged device in an unusual location might get read-only access or be blocked entirely.

Step 5: Monitor and Iterate

Zero Trust is never “done.” It’s a continuous cycle of monitoring, learning, and tightening.

What to Monitor

Feed monitoring data back into your policy engine. Zero Trust architectures get smarter over time — but only if you close the feedback loop.

Iterating Outward

Once your first protect surface is secured, move to the next. Each iteration follows the same five steps: identify the protect surface, map flows, build the microperimeter, write policies, monitor.

Start with your highest-value assets. CISA’s Zero Trust Maturity Model defines progression from Traditional through Advanced to Optimal maturity across each pillar. You don’t need to be Optimal everywhere on day one. You need to be making measurable progress.

If It Already Happened

If you’ve experienced a breach where lateral movement was the primary escalation path — an attacker got in through one system and pivoted across your flat network to reach crown jewels — Zero Trust is the architectural answer.

Start the post-incident rebuild with the compromised protect surface. Map how the attacker moved. Every hop they made is a transaction flow that should have been denied. Build the microperimeter that would have stopped them. Then expand outward from there.

Report the incident through CISA and relevant regulatory channels. Use the breach as the business case for Zero Trust investment — the lateral movement path is the evidence.


Zero Trust isn’t a switch you flip. It’s a protect surface you identify, a transaction flow you map, a policy you write, and a control you enforce — then you do it again for the next one. Pick your most critical asset. Define its protect surface. Map who needs access and how. Build the microperimeter. Write the policy. Monitor. That’s your first iteration. Start there.