← InsightsCybersecurity

Zero Trust Is Not a Product — It Is an Architecture Philosophy

Faraz Khan·Head of Security Practice·Apr 2, 2026·9 min read

Every major security vendor now claims their product delivers "zero trust." This has turned a genuinely powerful architectural principle into a marketing catch-phrase that means nothing and everything simultaneously.

Let us be precise about what zero trust actually is, and how to implement it in practice.

The Core Principle

Zero trust is built on a single axiom: never trust, always verify. It rejects the traditional model where users inside a network perimeter are implicitly trusted.

In practice this means: every user, device, and service must be authenticated and authorised for every request — regardless of whether they are inside or outside the physical or virtual network perimeter. There is no "inside."

The Three Pillars

1. Identity as the Control Plane

All access decisions are rooted in verified identity — user identity, device identity, and service identity. This requires a robust IdP (Okta, Azure AD, etc.), strong MFA, and a device trust evaluation signal.

Without a strong identity layer, zero trust is impossible. Start here.

2. Microsegmentation

Resources are not exposed to the whole network — they are isolated by function and communicate only through explicitly permitted paths. A compromised API server cannot reach your HR database because there is no network route between them.

This is the hardest part operationally. Mapping service-to-service communication patterns requires deep network observability and takes months in a complex environment.

3. Continuous Verification

Authentication is not a one-time event. Sessions are continuously evaluated based on device posture, behavioural anomalies, and contextual signals (time of day, location, request volume). A valid token can be revoked mid-session if risk signals change.

What Zero Trust Is Not

- It is not a product you can buy - It is not VPN replacement (though that is often a component) - It is not achievable overnight

We have seen companies spend ₹2Cr on a "zero trust platform" that was actually just a next-gen firewall with fancy marketing. The firewall is useful. It is not zero trust.

A Practical Roadmap

Zero trust implementation is a multi-year programme. A realistic sequence:

Year 1: Identity consolidation (single IdP, MFA everywhere), device management (MDM / EDR on all endpoints), network observability.

Year 2: Application microsegmentation starting with crown jewel systems, service account governance, privileged access management.

Year 3: Continuous monitoring and analytics, automated policy enforcement, third-party access governance.

The organisations that have successfully implemented genuine zero trust did not buy it — they built it incrementally, measurement by measurement.

FK

Faraz Khan

Head of Security Practice, Durrani Tech

Ready to apply these insights?

Talk to an Expert