Blog Security

Zero Trust Security: What It Means for Your Business

Tom Beech 10 Jul 2025
Zero Trust Security: What It Means for Your Business

The End of the Castle-and-Moat Approach

For decades, business IT security followed a simple model: build a strong perimeter, and trust everything inside it. The firewall was your castle wall, the VPN was the drawbridge, and once someone was connected to the corporate network they were treated as trusted. This approach made a certain amount of sense when all your people, devices, and data lived inside a single office building. But the world has changed dramatically, and this perimeter-based model has not kept pace.

Today, your employees work from home, from coffee shops, and from client sites. Your data lives in Microsoft 365, in cloud applications, and on mobile devices. Your partners and contractors need access to specific systems without being given the keys to the entire kingdom. The traditional perimeter has dissolved, and with it the assumptions that kept businesses safe for the past 30 years.

The National Cyber Security Centre (NCSC) has been advocating for a fundamental shift in how organisations think about network security. Their guidance on zero trust architecture reflects a growing consensus across the industry: the old model is broken, and businesses need a new approach. That approach is zero trust.

What Zero Trust Actually Means

Zero trust is not a single product you can buy or a switch you can flip. It is a security philosophy built on one core principle: never trust, always verify. Instead of assuming that anyone inside your network is legitimate, zero trust requires every user, device, and connection to prove its identity and authorisation before being granted access to any resource - every single time.

This might sound extreme, but it reflects the reality of modern threats. Attackers who breach your perimeter (through phishing, stolen credentials, or a compromised VPN) currently enjoy free movement across your internal network. In a zero trust model, breaching one system does not automatically give access to others. Every access request is evaluated independently, based on who is asking, what device they are using, where they are connecting from, and what they are trying to access.

The concept was originally coined by Forrester Research in 2010, but it has gained enormous momentum in recent years as remote work, cloud adoption, and increasingly sophisticated attacks have exposed the limitations of traditional security models. Microsoft, Google, and the UK government have all adopted zero trust principles for their own environments, and they are now advocating that businesses of all sizes do the same.

The Three Pillars of Zero Trust

Zero trust is built on three core pillars. Understanding these is essential before you start thinking about technology.

Pillar 1: Verify Explicitly

Every access request must be authenticated and authorised based on all available data points. This goes far beyond a simple username and password. A zero trust system considers the user's identity, their device health, their location, the sensitivity of the resource they are requesting, and any anomalies in their behaviour. If your Finance Director normally logs in from their laptop in London between 9am and 6pm, and suddenly a login attempt comes from an unfamiliar device in another country at 3am, the system should challenge or block that request - even if the correct password was used.

Pillar 2: Least Privilege Access

Users should only have access to the resources they need to do their job, and nothing more. This principle is straightforward in theory but surprisingly rare in practice. Many organisations give employees broad access by default, either because it is easier to manage or because access permissions accumulate over time as people change roles. Least privilege access means regularly reviewing and tightening permissions, using role-based access controls, and implementing just-in-time access for sensitive operations.

In practical terms, your marketing team should not have access to financial systems, your IT support staff should not have permanent admin rights to every server, and a contractor working on a specific project should only see the data relevant to that project. When someone changes role or leaves the business, their access should be adjusted immediately.

Pillar 3: Assume Breach

This is the pillar that most fundamentally changes how you design your security architecture. Instead of assuming your defences will keep attackers out, zero trust assumes they are already inside your network. This mindset shift leads to critical design decisions: segmenting your network so a breach in one area cannot easily spread to others, encrypting data in transit even on internal networks, implementing continuous monitoring to detect suspicious behaviour, and maintaining comprehensive logging so you can investigate incidents effectively.

Assuming breach does not mean accepting defeat. It means designing your systems so that even if an attacker gains a foothold, the damage they can do is contained and limited. It is the difference between a fire in a building with no fire doors (where the entire building is at risk) and a building with proper compartmentalisation (where a fire in one room is contained and manageable).

Identity Is the New Perimeter

In a zero trust world, identity replaces the network as the primary security boundary. Your firewall used to be the gatekeeper - if you were inside, you were trusted. Now, your identity provider is the gatekeeper. Every access decision starts with verifying who you are, and your identity follows you regardless of where you are working from or what device you are using.

For most UK businesses using Microsoft technologies, Microsoft Entra ID (formerly Azure Active Directory) is the foundation of this identity-centric approach. Entra ID is the central directory that manages user identities, authenticates access requests, and enforces security policies across your entire Microsoft ecosystem - and beyond. It is the control plane through which all zero trust decisions flow.

Strong identity verification starts with multi-factor authentication (MFA), which should be mandatory for every user without exception. But MFA alone is not enough. True zero trust identity requires conditional access policies that evaluate multiple risk signals before granting access, continuous session monitoring that can revoke access if conditions change, and integration with device management to ensure only healthy, compliant devices can connect to business resources.

Implementing Zero Trust with Microsoft Technologies

One of the advantages of being a Microsoft-centric business is that the tools for implementing zero trust are already included in many Microsoft 365 licence tiers. You do not necessarily need to buy additional products - you need to configure and use the ones you already have. Here is how the key Microsoft technologies map to zero trust principles.

Conditional Access Policies

Conditional Access in Microsoft Entra ID is the policy engine that makes zero trust decisions. It evaluates each access request against a set of conditions you define, and then either grants access, blocks access, or requires additional verification. Conditions can include the user's location, the device they are using, the application they are trying to access, their risk level, and whether their device meets compliance requirements.

For example, you might configure a policy that allows access to email from any compliant device but requires MFA and blocks access from unmanaged devices when someone tries to access your financial systems. Or you might block all access from countries where your business does not operate, while allowing normal access from the UK and requiring additional verification from other locations where your staff occasionally travel.

The power of Conditional Access lies in its granularity. You can create different policies for different applications, user groups, and scenarios, building a nuanced security posture that protects sensitive resources without creating unnecessary friction for everyday tasks.

Microsoft Intune for Device Compliance

Zero trust does not just verify users - it verifies devices. Microsoft Intune is the mobile device management (MDM) and mobile application management (MAM) platform that ensures devices meet your security standards before they can access business resources. Intune can enforce encryption, require up-to-date operating systems, check for the presence of endpoint protection software, and block jailbroken or rooted devices.

When combined with Conditional Access, Intune creates a powerful gate: only devices that are enrolled, compliant, and healthy can access your Microsoft 365 data and business applications. A user logging in from an unmanaged personal laptop might be allowed to read emails in a web browser but blocked from downloading attachments or accessing SharePoint. This protects your data without completely preventing access for people who occasionally need to work from a non-corporate device.

Microsoft Defender Suite

The Microsoft Defender suite provides the threat detection and response capabilities that support the "assume breach" pillar. Defender for Endpoint monitors devices for suspicious activity, Defender for Office 365 protects against email-borne threats, and Defender for Identity watches for compromised accounts and lateral movement within your network. Together, they provide continuous monitoring that can detect and respond to threats in real time.

The integration between these Defender products is where the real value lies. An alert in Defender for Office 365 about a suspicious email can trigger an investigation in Defender for Endpoint to check whether the user's device has been compromised, which can automatically invoke a Conditional Access policy to block the user's access until the situation is resolved. This automated, coordinated response is exactly what zero trust demands.

Microsegmentation: Containing the Blast Radius

Traditional flat networks allow traffic to flow freely between all devices and systems. If an attacker compromises one workstation, they can typically reach every other system on the network. Microsegmentation addresses this by dividing your network into small, isolated segments, each with its own access controls. Traffic between segments is inspected and controlled, so even if an attacker compromises one segment, they cannot easily move to others.

For SMBs, microsegmentation does not need to be as complex as it sounds. It can start with basic network segmentation using VLANs and firewall rules - separating your server network from your user network, isolating guest Wi-Fi from corporate resources, and placing sensitive systems like finance servers on their own protected segment. Even these basic steps dramatically reduce the potential impact of a breach.

As your zero trust maturity grows, you can implement more granular controls. Application-level segmentation ensures that only authorised applications can communicate with each other. Identity-based segmentation uses user and device identity to control network access dynamically. The goal is to reduce the "blast radius" of any single compromise to the absolute minimum.

NCSC Guidance on Zero Trust Architecture

The NCSC has published comprehensive guidance on zero trust architecture that is particularly relevant for UK businesses. Their framework identifies eight key principles for a zero trust architecture:

  • Know your architecture - including users, devices, services, and data. You cannot protect what you do not know about.

  • Know your user, service, and device identities - create a single, comprehensive identity for each that can be used to authenticate and authorise access.

  • Assess user behaviour, device health, and service health - use continuous monitoring to detect anomalies and respond to risks in real time.

  • Use policies to authorise requests - every access request should be evaluated against a set of defined policies rather than relying on implicit trust.

  • Authenticate and authorise everywhere - do not rely on network location as a proxy for trust. Verify every connection regardless of where it originates.

  • Focus your monitoring on users, devices, and services - shift from network-centric monitoring to identity-centric monitoring.

  • Do not trust any network, including your own - encrypt all traffic, even on internal networks, and treat all networks as hostile.

  • Choose services designed for zero trust - when selecting new technology, prioritise solutions that support zero trust principles natively.

These principles provide a solid framework for UK organisations of all sizes. The NCSC recognises that zero trust is a journey, not a destination, and encourages businesses to adopt these principles incrementally based on their specific risk profile and capabilities.

Practical Steps for SMBs Getting Started

Zero trust can feel overwhelming, particularly for smaller businesses without dedicated security teams. The good news is that you do not need to implement everything at once. Here is a practical roadmap for UK SMBs that want to start their zero trust journey.

Phase 1: Secure your identities. This is the single most impactful step you can take. Enable MFA for every user across all Microsoft 365 and business applications. Implement Conditional Access policies to block access from unexpected locations and unmanaged devices. Review and remove excessive permissions, particularly for admin accounts. Use separate admin accounts for IT staff rather than granting admin rights to their everyday accounts.

Phase 2: Manage your devices. Enrol all corporate devices in Microsoft Intune and define compliance policies. Require device encryption, up-to-date operating systems, and active endpoint protection. Link device compliance to Conditional Access so that only healthy devices can access business resources. Create policies for personal devices (BYOD) that protect business data without being overly intrusive.

Phase 3: Segment your network. Review your current network architecture and identify opportunities for segmentation. At a minimum, separate guest Wi-Fi from your corporate network, isolate servers from user devices, and place sensitive systems on protected segments with strict access controls. Ensure your firewalls are configured to enforce these boundaries.

Phase 4: Implement monitoring and response. Deploy Microsoft Defender across your endpoints, email, and identity infrastructure. Configure alerting for suspicious activity and establish procedures for investigating and responding to alerts. Consider a managed IT support partner who can provide 24/7 monitoring and incident response if your internal team cannot cover this.

Phase 5: Iterate and mature. Zero trust is not a project with a completion date - it is an ongoing process of continuous improvement. Regularly review your policies, test your controls, and adapt to new threats and business changes. Each iteration makes your security posture stronger and brings you closer to a mature zero trust architecture.

Common Misconceptions About Zero Trust

Zero trust has become a marketing buzzword, and with that comes a fair amount of confusion. Let us clear up some of the most common misconceptions.

"Zero trust means trusting nobody." Not quite. Zero trust does not mean you never grant access - it means you never grant access without verification. The goal is informed trust based on verified identity, device health, and context, rather than implicit trust based on network location.

"Zero trust is a product you can buy." No vendor sells a "zero trust box." Zero trust is an architecture and a philosophy that requires a combination of technologies, policies, and processes. Be wary of any vendor claiming their single product delivers complete zero trust.

"Zero trust is only for large enterprises." This was perhaps true a decade ago when implementing zero trust required significant custom development and expensive infrastructure. Today, platforms like Microsoft 365 include zero trust capabilities in standard licence tiers, making it accessible to businesses of all sizes. An SMB with 50 users can implement meaningful zero trust controls using the same Microsoft technologies as a global enterprise.

"Zero trust will slow down my users." When implemented well, zero trust should be largely invisible to your users for their day-to-day activities. MFA adds a few seconds to the login process, and Conditional Access works silently in the background for most access requests. Users only encounter additional friction when their behaviour deviates from normal patterns - which is exactly when you want additional verification.

"We have a firewall, so we do not need zero trust." A firewall is still an important component of your security architecture, but it is no longer sufficient on its own. When your data lives in the cloud, your users work remotely, and attackers routinely bypass perimeter defences through phishing, the firewall alone cannot protect you. Zero trust complements your existing cyber security controls - it does not replace them.

Start Your Zero Trust Journey with Coffee Cup Solutions

Zero trust is a journey, and every business starts from a different point. Whether you are just beginning to think about MFA and Conditional Access or you are ready to implement comprehensive identity-driven security across your organisation, Coffee Cup Solutions can help you move forward at a pace that suits your business.

Our cyber security team has deep expertise in Microsoft security technologies, including Entra ID, Conditional Access, Intune, and the Defender suite. We help UK businesses design and implement zero trust architectures that are practical, effective, and aligned with NCSC guidance. Combined with our managed IT support, we provide ongoing monitoring, maintenance, and optimisation to ensure your zero trust controls remain effective as your business evolves.

Get in touch for a free security assessment. We will review your current security posture, identify the highest-impact improvements, and create a practical roadmap for your zero trust journey. Because in a world where the perimeter has disappeared, trust must be earned - not assumed.

Need IT help?

Our team of experts is ready to help your business with any IT challenge.

Get in touch Call 0118 384 2175
Back to blog

Stay in the loop

Get the latest IT insights, tips, and news delivered straight to your inbox.

We use cookies to enhance your experience on our site. By continuing to browse, you agree to our Cookie Policy.