← Back to Blog
APRIL 15, 2020

Building a Zero Trust Roadmap That Actually Works

Author: Aaron Smith

If you’re leading security in April 2020, you’re probably dealing with two realities at once: a sudden remote-work surge and a flood of vendor pitches calling everything “Zero Trust.” Most teams I talk to are trying to move fast without breaking operations, and they’re understandably skeptical of another big architecture slogan.

That skepticism is healthy.

Zero Trust is useful only if it becomes a practical operating model: better access decisions, tighter blast-radius control, and measurable risk reduction. If it turns into a tool shopping exercise, it fails.

With NIST SP 800-207 moving toward publication and remote work accelerating faster than most roadmaps anticipated, this is the right time to reset. Here’s a roadmap that works in real enterprises, especially when budgets are fixed and teams are stretched.

Start with outcomes, not architecture diagrams

Before touching tooling, define what “better” means for your business in the next 6–12 months. Keep it concrete.

Examples:

  • Reduce account takeover impact for remote users
  • Cut privileged access standing time by 80%
  • Limit lateral movement between user, server, and cloud workloads
  • Improve incident containment time from days to hours
  • Raise confidence in third-party and contractor access

If your program objectives aren’t tied to measurable operational outcomes, Zero Trust becomes philosophical. Security teams need an execution model, not a manifesto.

The practical Zero Trust model (2020 edition)

In plain terms, Zero Trust means no implicit trust based on network location. Every access request should be evaluated continuously using identity, device, workload, and context signals, then enforced through policy.

In 2020, most enterprises won’t rip and replace core infrastructure. So the practical model is an overlay:

  1. Strengthen identity as the primary control plane
  2. Add strong device and session context
  3. Segment critical resources to shrink blast radius
  4. Enforce least privilege and just-in-time elevation
  5. Instrument everything for policy feedback and detection

This is iterative by design. You can deliver value in phases without waiting for a “finished” architecture.

Phase 1 (0–90 days): Stabilize remote access risk

This phase is about reducing immediate risk created by rapid remote work expansion.

1) Clean up identity foundations

Identity is now your perimeter. Treat it that way.

  • Enforce MFA for all external and privileged access
  • Remove legacy authentication paths that bypass modern controls
  • Centralize SSO where possible; reduce password sprawl
  • Eliminate dormant accounts and stale contractor identities
  • Tighten federation trust settings and token lifetimes

Quick win: focus first on admin roles, VPN access, email, and collaboration suites. That’s where compromise impact is highest.

2) Add conditional access based on risk signals

Don’t just check username/password + MFA and call it done.

Use policy to evaluate:

  • Device posture (managed vs unmanaged, patch status, EDR presence)
  • Geo-velocity and anomalous sign-in patterns
  • Privilege level of requested resource
  • Session behavior anomalies

Start with high-risk use cases: privileged consoles, finance systems, source code repositories, and remote admin protocols.

3) Reduce VPN overreach

Most emergency remote rollouts granted broad network-level access. That’s exactly what adversaries want.

  • Move from broad network tunnels toward app-specific access
  • Restrict split-tunnel and full-tunnel defaults by risk profile
  • Segment remote access paths by role and sensitivity
  • Require stronger controls for administrative network paths

You may not fully replace VPN this quarter, but you can remove “any authenticated user can reach half the network” patterns quickly.

Phase 2 (3–6 months): Segment where it matters most

This is where many programs stall because teams attempt enterprise-wide segmentation too early. Don’t.

Prioritize crown-jewel workflows and high-impact pathways.

4) Define protect surfaces, not giant zones

Think small and specific. Protect surfaces are critical data, applications, assets, and services that matter most.

Examples:

  • Identity infrastructure (IdP, AD connectors, PKI)
  • Source code and build pipelines
  • Financial systems and payment workflows
  • Customer data stores and regulated workloads

Map who needs access, from what devices, under what conditions, and for how long.

5) Apply micro-segmentation incrementally

Use host, workload, and application-level controls to reduce lateral movement.

  • Isolate admin planes from user subnets
  • Separate production from non-production rigorously
  • Restrict east-west traffic to explicit allow rules
  • Use service identity and mutual auth where feasible
  • Segment cloud workloads by sensitivity, not just account boundary

Don’t aim for perfect policy on day one. Begin with visibility mode, validate business flows, then enforce in stages.

6) Rework privileged access

Privileged access is still the shortest path to catastrophic impact.

  • Remove standing domain/admin rights where possible
  • Implement just-in-time elevation for admin tasks
  • Require stronger auth and hardened workstations for admin actions
  • Record and review high-risk privileged sessions
  • Separate break-glass procedures from daily operations

If you do only one thing beyond MFA this year, do this.

Phase 3 (6–12 months): Make policy adaptive and provable

At this stage, Zero Trust shifts from project to operating discipline.

7) Build policy-as-code and governance rhythm

Documenting policy in slide decks is not control. Enforceable, testable policy is.

  • Standardize access policy templates by resource class
  • Version-control policy changes
  • Add approval workflows tied to risk and business ownership
  • Define explicit exception handling and expiration dates

Security architecture should provide reusable guardrails, not one-off negotiation every time a new app launches.

8) Instrument decision points end-to-end

You need telemetry to prove efficacy and tune policy.

Capture and correlate:

  • Authentication events and risk scores
  • Authorization decisions and policy denies
  • Device posture changes over time
  • East-west traffic attempts and blocked pathways
  • Privileged elevation and session activity

Feed this into detection engineering and response playbooks. Zero Trust without observability is blind trust with extra steps.

9) Measure what leadership actually cares about

Avoid vanity metrics like number of tools deployed.

Track:

  • Time to contain credential-based incidents
  • Percentage of critical apps behind conditional access
  • Reduction in standing privilege across admin populations
  • Lateral movement paths eliminated for crown-jewel assets
  • Mean time to revoke risky access (employee change, contractor offboarding, incident response)

Tie these metrics to business risk narratives leadership understands: outage risk, fraud exposure, regulatory impact, and operational resilience.

Common failure patterns to avoid

  1. Tool-first programs
Buying a ZTNA product before defining access outcomes creates expensive ambiguity.

  1. Network-only interpretation of Zero Trust
Segmentation matters, but identity and privilege controls are the leverage points in hybrid environments.

  1. Boil-the-ocean sequencing
Enterprise-wide micro-segmentation as a first move usually fails. Start with protect surfaces.

  1. No business ownership
If app owners and infrastructure leads are not accountable for policy outcomes, exceptions will swallow your program.

  1. No migration path for legacy systems
Legacy protocols and hard-coded service dependencies need explicit transition plans, not wishful thinking.

Implementation blueprint for security leaders

If you need a practical sequence for the next quarter, use this:

  • Weeks 1–2: Confirm business outcomes, define top 5 protect surfaces, assign owners
  • Weeks 3–6: Enforce MFA + conditional access on privileged and high-risk workflows
  • Weeks 7–10: Remove broad remote access patterns, pilot app-specific controls
  • Weeks 11–14: Implement segmentation controls around one crown-jewel workflow
  • Weeks 15–16: Review metrics, codify policy standards, plan next protect surface

This creates momentum and credibility. Teams see reduced risk without massive disruption.

Final thought: Zero Trust is an operating model, not a product category

The teams that succeed in Zero Trust don’t have the fanciest stack. They have clear outcomes, disciplined sequencing, and strong cross-functional ownership.

In this Q2 2020 environment, the winning strategy is to harden identity, shrink access paths, reduce privilege risk, and measure impact relentlessly. Do that in iterative cycles and your architecture will mature naturally toward the NIST 800-207 model.

Don’t wait for perfect conditions. Start where risk is highest, enforce policy where impact matters most, and build from there.

Want to Learn More?

For detailed implementation guides and expert consultation on cybersecurity frameworks, contact our team.

Schedule Consultation →