Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & Training

Zero Trust at 15: The Strategy That Refused To Become a Product

By John Kindervag
Two open padlocks with one closed
FlyD via Unsplash
September 30, 2025

15 years ago, while working as an analyst at Forrester Research, I introduced the zero trust security model. At the time, cybersecurity professionals still relied on the flawed idea that they could trust everything inside the network. But real-world breaches told a different story: attackers were exploiting a broken trust model, bypassing defenses with ease, and then moving laterally to their objectives.

From the beginning, zero trust was never a tool or a feature; it was a strategy. It remains the world’s only cybersecurity strategy. You don’t buy it; you build it. And it rests on one core principle: never trust, always verify.

Over the years, vendors have tried to package and sell it. But zero trust isn’t a SKU. It’s a way of designing systems that contain threats and limit damage the moment an attack begins. It aligns defenses with how adversaries actually operate, rather than with outdated assumptions about secure perimeters.

The adoption journey, however, can feel daunting. That’s why I often use the image of the wooden staircase in Sunnfjord, Norway, near where my grandfather was born. It’s the longest staircase in the world, with 4,444 steps carved into the mountainside by workers who hauled concrete and steel for a hydroelectric plant more than a century ago. No one climbed all those steps in a single stride; they took them one at a time. 

Zero trust works the same way. You don’t start with your most sensitive assets. You begin with lower-value systems, learn, practice, and then apply what you’ve mastered to your crown jewels. Incremental, iterative, and non-disruptive progress is what makes zero trust practical and achievable.

Segmentation, Not Identity, Is the Foundation

Some try to recast zero trust as an identity-first model. Identity matters; it is consumed by policy in zero trust environments, but it’s not the tactical foundation. Segmentation is. Without segmentation, you can’t isolate sensitive data, applications, assets, and services (i.e., DAAS elements) into Protect Surfaces. And without Protect Surfaces, you can’t enforce meaningful policy. Segmentation is what turns zero trust from concept into architecture.

The Five-Step Model

The first step in implementing zero trust is defining the Protect Surface by identifying the DAAS elements that matter most. DAAS is an acronym I created to help people understand what to put into a Protect Surface: Data, Applications, Assets, and Service. From there, organizations map transaction flows to understand how data moves and where to place controls. Next comes architecting from the inside out, building security around each Protect Surface rather than the perimeter. Write policy by following the Kipling Method (i.e., who, what, when, where, why, and how) so that every decision becomes an explicit allow or deny. Finally, monitor and maintain the system, utilizing telemetry to continually improve and adapt.

Debunking Common Misconceptions

The biggest roadblock to successfully implementing a zero trust strategy is misunderstanding. Leaders think zero trust is a product, and teams believe it’s a project. It’s neither. It’s an ongoing process of refinement and reinforcement.

Another common mistake is trying to do everything at once. Zero trust is built one Protect Surface at a time. If you try to cover the entire environment in one move, complexity overwhelms progress.

Too often, organizations also cling to outdated models or treat zero trust as a compliance checkbox. Even when technical teams understand the strategy, programs usually stall without strong leadership. Incentives determine outcomes.

 As Charlie Munger, Warren Buffett’s longtime partner at Berkshire Hathaway, famously said, “Show me the incentive and I’ll show you the outcome.” When executives set the right priorities and tie them to business goals, zero trust succeeds. Without that leadership, most efforts fail to move past the talking stage.

Finally, don’t treat cybersecurity as a probability exercise. Risk equations can’t capture the reality of modern threats. The internet provides attackers with constant proximity to your systems, and they already possess the necessary tools and skills to strike. That makes attacks imminent, not hypothetical. The better lens is a danger, not a risk. Just as parents don’t calculate the odds of a child being electrocuted before covering outlets, organizations shouldn’t delay protecting obvious vulnerabilities.

Why Zero Trust Endures

Zero trust is a strategy that’s not tied to any one technology. It adapts to AI, quantum threats, and hyper-connected environments. It scales with automation. It thrives on visibility.

Most importantly, it forces the right question: What are we trying to protect? That question shifts the focus from vague notions of perimeter defense to asset-centric security. It turns policy into enforceable controls. And it gives defenders the advantage — because attackers can’t exploit what they can’t reach.

Looking Ahead

Today’s threats move at machine speed, so defenses must as well. Controls can’t wait for human response. They must act automatically because containment must be instantaneous.

AI gives attackers new capabilities, but it also offers defenders powerful tools. Visualization, behavioral analytics, and real-time enforcement aren’t optional; they’re essential. Only a machine can defeat another machine, and automation makes that possible.

In this post-perimeter, post-human world, zero trust provides the framework for resilience. It stops breaches, renders other attacks ineffective, and ensures organizations can withstand what comes next.

Zero trust began as a challenge to flawed assumptions. Today, it has become the foundation of modern cybersecurity. Its strength lies not in technology but in the clarity of its principles. If you’ve already begun the journey, stay on course. If you haven’t, now is the time to start. Trust is a vulnerability, and eliminating it is your strongest defense.

KEYWORDS: cyber resilience resilience zero trust

Share This Story

John kindervag headshot

John Kindervag is Chief Evangelist at Illumio. Image courtesy of Kindervag

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing