Zero Trust rollout: from VPN replacement to mature program
What Zero Trust actually is
Zero Trust is a model, not a product. NIST SP 800-207 describes it as continuous verification of identity, device, and context for every access decision. The product category that delivers most of it is ZTNA.
The honest sequence
Quarter 1: Foundation. Modernize identity. SSO covering 90% of apps. MFA enforced for all users. Conditional Access policies tested.
Quarter 2: ZTNA pilot. Pick one critical internal app. Replace VPN access to it with a ZTNA gateway. Verify the user experience and audit visibility.
Quarter 3-4: ZTNA expansion. Onboard the next 20 apps. Sunset the corresponding VPN tunnels. Establish device posture signals.
Year 2: Microsegmentation and continuous monitoring. East-west controls (Illumio-style) to limit blast radius after compromise. SOC integration for real-time policy decisions.
Year 2 ongoing: SaaS data controls. CASB / SSE for SaaS app traffic. Inline DLP. Browser isolation for risky URLs.
Vendor decisions
The ZTNA layer is the high-leverage decision. Cloudflare, Zscaler, Netskope, Palo Alto Prisma, and Tailscale represent different price-performance points. Microsegmentation is a separate purchase (Illumio, Akamai Guardicore, native cloud).
Common pitfalls
- Buying ZTNA before identity hygiene is complete — garbage in, garbage out
- Treating Zero Trust as a single project instead of a multi-year program
- Skipping the VPN sunset — running both indefinitely is the worst of both worlds
- Underestimating change management for users moving from VPN to ZTNA
- Buying microsegmentation before basic posture signals are flowing