Quick Answer
The five pillars of zero trust security are identity, devices, networks, applications and workloads, and data. They come from the CISA Zero Trust Maturity Model, which builds on the architectural foundation set out in NIST Special Publication 800-207. Across all five pillars, three cross-cutting capabilities apply: visibility and analytics, automation and orchestration, and governance. Zero trust replaces the old perimeter model ("trusted inside, untrusted outside") with continuous verification of every request, regardless of where it originates. No user, device, or workload is trusted by default; access is granted per session based on identity, context, and policy. Defining Zero Trust Zero trust is an architectural approach in which access decisions are made on a per-request basis using strong identity, device posture, and contextual signals, with the assumption that the network is already compromised. NIST SP 800-207 defines the core tenets and reference architecture; CISA's Zero Trust Maturity Model translates those tenets into the five-pillar structure that most enterprise programs use today.
Key Topics Covered
Free penetration test
Free cloud & web-app pentest for qualified companies. SOC 2, HIPAA, PCI DSS-aligned report.
ApplyThe five pillars of zero trust security are identity, devices, networks, applications and workloads, and data. They come from the CISA Zero Trust Maturity Model, which builds on the architectural foundation set out in NIST Special Publication 800-207. Across all five pillars, three cross-cutting capabilities apply: visibility and analytics, automation and orchestration, and governance.
Zero trust replaces the old perimeter model ("trusted inside, untrusted outside") with continuous verification of every request, regardless of where it originates. No user, device, or workload is trusted by default; access is granted per session based on identity, context, and policy.
Defining Zero Trust
Zero trust is an architectural approach in which access decisions are made on a per-request basis using strong identity, device posture, and contextual signals, with the assumption that the network is already compromised. NIST SP 800-207 defines the core tenets and reference architecture; CISA's Zero Trust Maturity Model translates those tenets into the five-pillar structure that most enterprise programs use today. For background, see our zero trust architecture overview.
The Five Pillars
| Pillar | Core question | Key controls |
|---|---|---|
| Identity | Who is requesting access? | Phishing-resistant MFA, single sign-on, identity governance, conditional access, just-in-time privilege |
| Devices | Is the device known, healthy, and compliant? | Device inventory, MDM/UEM, endpoint detection and response, posture checks at access time |
| Networks | Is the traffic going where it should, and is it inspected? | Micro-segmentation, encrypted transport, software-defined perimeter, traffic inspection without implicit trust |
| Applications and workloads | Is the application secure, and is access authorized per session? | Application-layer authorization, secure development, workload identity, runtime protection, API security |
| Data | Is sensitive data classified, encrypted, and accessed only as needed? | Classification, encryption in transit and at rest, DLP, rights management, access policies tied to data sensitivity |
The three cross-cutting capabilities (visibility and analytics, automation and orchestration, governance) span every pillar. Without telemetry from each pillar feeding a central analytics layer, policy decisions cannot be contextual; without automation, the volume of decisions is unmanageable; without governance, controls drift.
Need help with cloud?
Book a free 30-minute meeting with one of our cloud specialists. We'll analyse your situation and provide actionable recommendations β no obligation, no cost.
Who Should Adopt Zero Trust
Zero trust is now the default architectural direction for most enterprises and the explicit requirement for US federal agencies under Executive Order 14028. European regulators do not mandate zero trust by name, but NIS2, DORA, and the GDPR principle of security by design all push in the same direction. Sectors with high regulatory pressure (financial services, healthcare, critical infrastructure) and any organization with a remote or hybrid workforce benefit first.
For maturity, CISA defines four stages per pillar: Traditional, Initial, Advanced, and Optimal. Most enterprises start at Traditional or Initial across the board and progress unevenly. Identity is usually the first pillar to reach Advanced because it has the clearest off-the-shelf tooling.
How to Start
Begin with an honest assessment against the five pillars using the CISA maturity model. Pick one pillar where you have both high risk and clear ownership, typically identity, and reach a defined target stage before moving on. Replace VPN-based remote access with a zero trust network access (ZTNA) solution as an early high-impact win. Build the visibility layer in parallel so you can measure progress and detect policy gaps.
The most common pitfalls are buying a "zero trust product" and assuming the architecture follows, ignoring legacy applications that cannot enforce per-request authorization, and skipping the data pillar because it is the hardest. Treat zero trust as a multi-year program with quarterly milestones, not a single project. Our cybersecurity services overview describes the operating model in more depth.
How Opsio Helps
Opsio designs and operates zero trust architectures for European and Indian enterprises across AWS, Azure, and Google Cloud. Our cybersecurity services cover identity modernization, ZTNA rollout, micro-segmentation, and data protection, while our managed cloud services embed zero trust into the landing zone from day one. Contact our security team for a maturity assessment against the CISA model.
Frequently Asked Questions
Is zero trust the same as ZTNA?
No. Zero Trust Network Access (ZTNA) is a category of products that enforces zero trust principles for application access, replacing traditional VPNs. Zero trust as a whole is a much broader architecture covering identity, devices, networks, applications, and data. ZTNA is typically one of the first technologies deployed in a zero trust program, but it addresses only part of the network pillar.
Does zero trust require us to rip and replace existing security tools?
Rarely. Most enterprises already own significant parts of the stack: identity provider, MFA, endpoint detection, SIEM, firewalls. Zero trust adoption is mostly about reconfiguring policies, closing gaps (especially around per-request authorization and device posture), and integrating telemetry so decisions become contextual. New investment usually focuses on ZTNA, microsegmentation, and the analytics layer.
How does zero trust apply to cloud-native and Kubernetes environments?
It applies directly. Workload identity (SPIFFE/SPIRE, cloud-native IAM), service mesh with mutual TLS, network policy at the pod level, and signed images all implement zero trust principles for the applications and workloads pillar. Cloud-native environments are often easier to bring to Advanced maturity than legacy data centers because the controls are programmable.
What is the relationship between zero trust and NIS2 or DORA?
Neither regulation mandates zero trust by name, but both require risk-based technical controls that zero trust delivers: strong authentication, least-privilege access, segmentation, monitoring, and incident response. A zero trust program is one of the most defensible answers to NIS2's security measures and DORA's ICT risk management requirements. See our NIS2 compliance guide for the regulatory mapping.
How long does a zero trust program take to implement?
Plan for three to five years to reach Advanced maturity across all five pillars, with meaningful risk reduction visible within the first 12 months from identity and ZTNA wins. The timeline depends on existing maturity, legacy application footprint, and willingness to enforce policies that initially break workflows. Programs that try to compress this into a single year typically deliver tooling without the operating model to sustain it.
Related Guides
Written By

Group COO & CISO at Opsio
Fredrik is the Group Chief Operating Officer and Chief Information Security Officer at Opsio. He focuses on operational excellence, governance, and information security, working closely with delivery and leadership teams to align technology, risk, and business outcomes in complex IT environments. He leads Opsio's security practice including SOC services, penetration testing, and compliance frameworks.
Editorial standards: This article was written by cloud practitioners and peer-reviewed by our engineering team. We update content quarterly for technical accuracy. Opsio maintains editorial independence.