_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN
Let's talk

Zero Trust Architecture in Practice — Complete Guide 2026

22. 12. 2025 8 min read CORE SYSTEMSsecurity
Zero Trust Architecture in Practice — Complete Guide 2026

Zero Trust Architecture (ZTA) has long ceased to be a buzzword. In 2026, it’s a practical way to operate secure hybrid cloud, remote access without traditional VPN, and micro-segmented applications so that compromising a single identity or a single service doesn’t cause a domino effect. This article is a technical guide for architects, CTOs, and security teams: we build on NIST SP 800-207, supplement with trends from recent years (passkeys, device posture, ZTNA/SSE, service mesh, policy-as-code), and show concrete implementation steps in a real environment.

What “Zero Trust” Means in Practice (and What It Doesn’t)

“Zero Trust” is often reduced to buying a ZTNA product. That’s a mistake. NIST SP 800-207 defines ZTA as an architecture that minimizes uncertainty when making access decisions and assumes the network is compromised. In practice, this means:

  • Identity is the new perimeter — both users and workloads must be unambiguously verified.
  • Access is per-request / per-session — the decision is made for a specific action and context.
  • Continuous evaluation — risk is recalculated, a session can be “cut off” mid-stream.
  • Least privilege — role, scope, time, network flow, and data operation.

And what Zero Trust is not: it’s not a one-time project, it’s not a synonym for MFA, and it’s not “just” network segmentation. It’s an operational model across identity, devices, network, applications, data, and telemetry.

Reference Architecture per NIST SP 800-207

NIST 800-207 describes the logical components of ZTA and their relationships. In practice, you’ll typically encounter these roles:

  • Policy Decision Point (PDP) — the decision point in the control plane:
  • Policy Engine (PE) evaluates signals (identity, device posture, risk, context).
  • Policy Administrator (PA) “enforces” the decision (e.g., sets rules/config on the PEP).
  • Policy Enforcement Point (PEP) — in the data plane, enforces allow/deny (proxy, gateway, sidecar, firewall, agent).
  • Telemetry & signal sources — IAM, EDR/MDM, SIEM, asset inventory, CMDB, vulnerability mgmt.
                    +--------------------------- Control plane ----------------------------+
                    |                                                                      |
                    |  Telemetry & signals:                                                |
                    |  - IdP/IAM (SSO, MFA, risk)    - EDR/MDM (posture)                    |
                    |  - SIEM/UEBA (anomalies)       - CMDB/Inventory                       |
                    |  - Vuln mgmt / CSPM / CNAPP                                         |
                    |                 \                         |                          |
                    |                  \                        |                          |
                    |                   v                       v                          |
                    |              +-------------------------------+                        |
                    |              |   PDP (Policy Engine + Admin) |                        |
                    |              +-------------------------------+                        |
                    |                         | (policy decision)                            |
                    +-------------------------|----------------------------------------------+
                                              v
                    +--------------------------- Data plane --------------------------------+
                    |                                                                       |
                    |  User/Device ---->  PEP (ZTNA proxy / gateway / mesh sidecar)  ----> App/API
                    |                                                                       |
                    |                         (mTLS, authz, rate limit, logging)            |
                    +-----------------------------------------------------------------------+

Important detail: NIST separates control plane and data plane. This is practical advice: policy decision-making (where sensitive signals are) should be isolated and audited, while enforcement runs as close to workloads and users as possible.

Zero Trust Principles That Matter in 2026

1

Phishing-Resistant Identity (Passkeys, FIDO2) Instead of “MFA as a Checkbox”

The most common path to a breach is a compromised identity. SMS and TOTP MFA are often no longer sufficient in 2026. The goal is phishing-resistant authentication: FIDO2 security keys / passkeys, or certificate-based. For privileged accounts, combine with device-bound login and JIT/JEA.

2

Device Posture as an “Entry Ticket” to the System

Zero Trust without device trust is half-baked. In practice, this means MDM enrollment, EDR agent, disk encryption, patch compliance, and blocking access from unmanaged devices (or at least a significantly restricted mode).

3

Microsegmentation for East-West Traffic (Not Just North-South)

An attacker inside the network is your default assumption. Microsegmentation should prevent lateral movement: in cloud via SG/NACL, in Kubernetes via network policies (default-deny), and between services via service mesh (mTLS + authz).

4

Policy-as-Code and Auditability

Once you have dozens of applications and hundreds of rules, manual clicking in a console is unsustainable. Define policies declaratively, version in Git, test (unit tests for rules), and deploy via CI/CD. This significantly increases consistency and compliance.

5

Continuous Access Evaluation

“Once logged in = forever trusted” is the old world. In 2026, enforce short token lifetimes, session revocation on risk changes, and signal correlation (UEBA + EDR + IdP). When an endpoint goes red, access should change within minutes.

Step-by-Step Implementation (A Roadmap That Works)

The biggest risk of a Zero Trust project is that it becomes an endless program without measurable outcomes. The recommended approach is iterative: select 1–2 protect surfaces (critical data/applications) and build the first end-to-end pass on them (identity → device → enforcement → logs).

0 — Pre-start

Define “Protect Surface” and Target Outcome

Select a specific asset (e.g., “internet banking admin,” “data warehouse with PII,” “production Kubernetes cluster”) and set metrics: who accesses it, from what devices, what the downtime tolerance is, what the regulatory requirements are.

1 — Identity

SSO Everywhere, Privileges Under Control

Introduce a unified IdP (Entra ID/Okta/Keycloak), mandatory MFA (ideally passkeys), and limit privileged accounts via PIM/PAM + JIT. For service accounts, switch to workload identity (OIDC federation) and rotate secrets.

2 — Devices

MDM/EDR + Access Rules

Define a baseline (encryption, patching, EDR, screen lock, prohibited apps) and project it into conditional access. Distinguish modes: full access (managed + compliant), limited access (managed but non-compliant), and block (unmanaged).

3 — Application Access

Replace “VPN to the Entire Network” with ZTNA/SSE

For internal web apps and APIs, use a ZTNA proxy/Identity-Aware Proxy. The PEP then enforces authentication and authorization for the specific application (not the entire subnet). It’s useful to start with one “high value” system and gradually migrate others.

4 — Microsegmentation

Default-Deny and Explicit Flows

Segment around applications and data, not around VLANs. In Kubernetes, set network policies (default-deny) and service-to-service authz. In traditional networks, use segmentation gateways and rules based on identity/workload (not just IP).

5 — Data

Classification, Encryption, DLP, and “Least Privilege” at the Data Operation Level

Zero Trust is not just about the network. Important is RBAC/ABAC for databases and data warehouses, tokenization/encryption of PII, access auditing, and DLP for exfiltration to SaaS. Without the data layer, ZTA remains a “nice gate” with an open warehouse.

6 — Telemetry

SIEM + Signal Correlation + Automation

Collect logs from IdP, PEP, EDR, and cloud providers. Build basic playbooks: session blocking on compromise, endpoint isolation, temporary privilege reduction. Without automation, Zero Trust will be “slower” than the attacker.

Practical Stack: Tools That Recur in Zero Trust Projects

Identity (IdP, MFA, PAM)

  • Microsoft Entra ID — SSO, Conditional Access, Identity Protection, PIM
  • Okta — SSO, adaptive MFA, lifecycle management
  • Keycloak — Open-source IdP for self-hosted scenarios

ZTNA / SSE (PEP for User Access)

  • Cloudflare Zero Trust — ZTNA, SWG, CASB, WARP client
  • Zscaler — SSE platform, extensive enterprise deployments
  • Google IAP / BeyondCorp — Identity-aware access to web apps and APIs

Workload & East-West (Microsegmentation)

  • Cilium / Calico — Kubernetes network policies, segmentation
  • Istio / Linkerd — mTLS, authz, traffic policy, observability
  • Illumio — Microsegmentation for hybrid environments

Devices (Posture)

  • Intune / Jamf — MDM, compliance, policy enforcement
  • CrowdStrike / SentinelOne — EDR/XDR, detection and device isolation
  • osquery / Kolide — Granular posture signals, audit

Policy-as-Code & Authorization Layer

  • Open Policy Agent (OPA) — Unified authorization and policy testing
  • HashiCorp Vault — Secrets, PKI, dynamic credentials
  • SPIFFE/SPIRE — Workload identity (especially for mesh)

Case Examples: What Zero Trust Deployment Looks Like in Different Companies

1) Bank / Regulated Environment

Priority: auditability, role separation, JIT privileges, core system segmentation. Practical pattern: Entra ID + PIM, ZTNA for admin interfaces, microsegmentation around core banking, SIEM correlation (IdP + EDR + firewall), and playbooks for immediate “session kill.”

2) Manufacturing / OT + IT

Priority: separate OT and IT, minimize lateral movement, controlled vendor access. Pattern: jump host / ZTNA to service zones, allow-list communication, identity-based access for technicians, long device lifecycle handled with compensating controls (monitoring, isolation, protocol gateways).

3) SaaS Company / Cloud-Native

Priority: workload identity, service-to-service authz, API and data protection. Pattern: service mesh (mTLS), OPA for authorization, short-lived tokens, secrets in Vault, CSPM/CNAPP for cloud posture and misconfiguration detection.

Key Takeaways (and Where to Start Tomorrow)

  1. Select 1 protect surface and do an end-to-end pass (IdP + posture + PEP + logs).
  2. Raise the identity bar (phishing-resistant MFA / passkeys) and switch privileges to JIT.
  3. End “VPN to the entire network” — switch to per-app access (ZTNA/IAP).
  4. Default-deny segmentation (Kubernetes network policies / mesh / SG).
  5. SIEM signal correlation and automated responses (session revoke, endpoint isolation).

If you’d like, we can walk through a quick workshop (2–4 hours) and produce the first realistic roadmap: what to do in 30/60/90 days, what to build it on technically, and how to measure it.

Conclusion

Zero Trust Architecture in 2026 is primarily about consistency in decision-making: the same rules for users and workloads, the same signals, the same audits — regardless of whether you’re on-prem, in the cloud, or on the road. The best implementations aren’t “the most restrictive” but the best automated and based on quality signals (identity + posture + telemetry).

Share:

CORE SYSTEMS

Stavíme core systémy a AI agenty, které drží provoz. 15 let zkušeností s enterprise IT.

Need help with implementation?

Our experts can help with design, implementation, and operations. From architecture to production.

Contact us