Back to Blog
Risk Management6 min read

Zero Trust in Plain English: What It Actually Means for Your Business

Zero trust isn't a product you buy—it's a way of thinking about access. Here's how to implement it without the vendor hype.

Zero trust has become one of the most over-marketed, under-explained concepts in security.

Every vendor claims to sell "zero trust solutions." Firewalls are now "zero trust firewalls." Identity products are "zero trust identity." Endpoint tools get branded as "zero trust endpoints." The marketing has gotten ridiculous.

This post cuts through the noise to explain what zero trust actually means—and how organizations can start implementing it without buying a single new product.

The Core Idea (It's Simpler Than Vendors Want You to Think)

Traditional network security works like a castle: build walls around the perimeter, and assume everyone inside is trustworthy. Your firewall is the moat. Once you're past it, you can wander anywhere.

This made sense when all your employees sat in one building, using company-owned computers, accessing servers in your closet.

That world is gone.

Now your employees work from coffee shops. Your applications live in three different clouds. Your contractors access systems from personal devices. The "inside" and "outside" of your network have become meaningless concepts.

Zero trust simply says: stop trusting location. Verify every access request, every time, regardless of where it comes from.

That's it. That's the whole philosophy.

The Three Things That Actually Matter

Forget the vendor frameworks with 47 pillars. Zero trust comes down to three principles:

1. Verify explicitly. Every access request should be authenticated and authorized based on all available data points—identity, device health, location, the resource being accessed, and anomalies in behavior.

2. Use least-privilege access. Give people access to exactly what they need, for exactly as long as they need it. Not "admin access because it's easier." Not "permanent access because removing it is annoying."

3. Assume breach. Design your systems as if attackers are already inside. Segment your network. Encrypt internal traffic. Monitor for lateral movement. Don't assume your firewall makes everything behind it safe.

Where to Start (Without Buying Anything)

Most organizations already have the tools for basic zero trust implementation. Here's what to do with them:

Start with Identity

This is the foundation. If you're not doing these things, nothing else matters:

  • Enable MFA everywhere. Not just VPN. Every cloud application, every admin console, every sensitive system. Phishing-resistant MFA (hardware keys, passkeys) is even better.
  • Audit your service accounts. These are often the most privileged accounts in your environment and frequently have passwords that haven't been rotated in years.
  • Implement SSO. Centralizing authentication gives you visibility and control you don't have when everyone's logging in to 40 different apps with different credentials.

Then Segment Your Network

You don't need fancy micro-segmentation products to get started:

  • Separate your critical systems. Your domain controllers, backup systems, and financial applications shouldn't be on the same network segment as general workstations.
  • Limit lateral movement. Can a compromised workstation directly access your file servers? Your database servers? If the answer is yes, you have work to do.
  • Isolate IoT and operational technology. That smart thermostat doesn't need access to your ERP system.

Finally, Implement Least Privilege

This is the hard one, because it requires ongoing discipline:

  • Review admin access. Who has domain admin? Why? Do they actually need it for their daily work?
  • Use just-in-time access. Instead of permanent privileged access, require people to request elevated access when they need it.
  • Audit regularly. Access creep is real. The intern from three years ago who's now in sales still has developer access to production.

The Roadmap Nobody Wants to Hear

Here's the uncomfortable truth: zero trust isn't a project with an end date. It's an ongoing operational model. But you can make meaningful progress in phases:

Phase 1: Visibility (Months 1-3) You can't protect what you can't see. Inventory your users, devices, applications, and data. Most organizations are shocked by what they find—shadow IT, forgotten service accounts, sensitive data in unexpected places.

Phase 2: Identity Foundation (Months 2-4) Get MFA deployed everywhere. Consolidate identity providers. Establish clear ownership for service accounts. This alone prevents the vast majority of credential-based attacks.

Phase 3: Network Segmentation (Months 3-6) Start with your most critical assets. Create isolation zones. Implement controls that limit east-west traffic. You don't need to boil the ocean—segment what matters most first.

Phase 4: Access Controls (Ongoing) Implement least privilege systematically. This is iterative work—you'll constantly refine access as you learn what people actually need versus what they've accumulated over time.

Phase 5: Continuous Improvement (Forever) Monitor for anomalies. Review access regularly. Adapt to new threats. Zero trust is a practice, not a destination.

Common Mistakes I See

Buying before planning. Vendors are happy to sell you zero trust products. But if you haven't inventoried your assets, cleaned up your identity sprawl, and defined your segmentation strategy, you're just adding complexity.

Going too fast. Locking down access aggressively without understanding workflows creates friction and shadow IT. People will find workarounds, and those workarounds are often less secure than what you started with.

Ignoring user experience. If your zero trust implementation makes people's jobs significantly harder, it will fail. The goal is security that's invisible when things are normal and protective when they're not.

Forgetting about legacy systems. That ancient application that can't support modern authentication? It's probably your biggest risk. Address legacy systems explicitly in your planning.

Treating it as a project. Zero trust isn't something you implement and finish. It's an ongoing program that requires continuous attention, monitoring, and refinement.

The Bottom Line

Zero trust isn't a product. It's not a certification. It's not something you buy from a vendor who promises to make you "zero trust compliant."

It's a fundamental shift in how you think about access and trust in your environment. Every request is verified. Every access is minimized. Every system is designed as if breach has already occurred.

Start with what you have. Enable MFA. Clean up access. Segment your critical systems. You'll be further along than most organizations who've spent millions on "zero trust solutions."


Need help assessing your current security posture or building a zero trust roadmap? Our security assessments identify gaps and prioritize improvements. Let's talk.

Jonathan Carpenter
Jonathan Carpenter
Founder, Anchor Cyber Security
Share:

Want to discuss this topic?

Let's talk about how these insights apply to your organization.

Get in Touch