{"id":6251,"date":"2025-08-15T14:53:46","date_gmt":"2025-08-15T13:53:46","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/\/\/what-is-zero-trust-and-how-should-business-owners-implement-it\/"},"modified":"2025-12-15T16:16:00","modified_gmt":"2025-12-15T16:16:00","slug":"what-is-zero-trust-and-how-should-business-owners-implement-it","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/","title":{"rendered":"What Is Zero Trust and How Should Business Owners Implement It?"},"content":{"rendered":"<p><em>Zero Trust is an increasingly popular concept within cyber security and it\u2019s one that business owners should be paying careful attention to. In this article, we explore what Zero Trust is and the factors that should be considered before implementing it.<\/em><\/p>\r\n<p>A defining characteristic of cyber security in the last quarter of a century has been its domination by discrete technologies such as anti-virus software, firewalling, intrusion detection, pen testing, sandboxing, threat intelligence, biometrics, and AI automation.<\/p>\r\n<p>The problem is that clever technology alone hasn\u2019t been enough to stop cyber attacks from getting steadily worse. Organisations implemented each generation in a best-fit manner, often quite chaotically, before a new one arrived to replace or supplement it. What was missing was a simple big idea to bind these components into a larger whole with greater rigour and conceptual depth.<\/p>\r\n<p>After searching for this game-changing idea for a long time it seems that the industry has finally found a good-looking candidate called zero trust (ZT). If you doubt the prominence of zero trust, run a Google search on the term and it\u2019ll return an extraordinary 645 million results, most from the last three years.<\/p>\r\n<p>It\u2019s become so important that none other than US President Joe Biden mentioned it in his now famous May 2021 <a href=\"https:\/\/www.whitehouse.gov\/\" target=\"_blank\" rel=\"noopener\">White House<\/a> executive order to improve national cyber security within 60 days:<\/p>\r\n<p>\u201cThe Federal Government must adopt security best practices; advance toward Zero Trust Architecture\u2026\u201d<\/p>\r\n<p>It went on to mention other improvements needed such as centralising analytics and using cloud security services, but it was hard to miss that zero trust has been placed at the top of the list.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>First Principles of Zero Trust<\/h2>\r\n<p>But what is Zero Trust and why has it grabbed so much attention so quickly?<\/p>\r\n<p>Who coined the term is unclear, but it was popularised by then Forrester analyst, John Kindervag, during a presentation in 2009. Building on the earlier work of the British Jericho Forum on <a href=\"https:\/\/en.wikipedia.org\/wiki\/De-perimeterisation\" target=\"_blank\" rel=\"noopener\">de-perimeterisation<\/a>, he observed that an important root of many security problems was the way organisations designed cyber security around increasingly obsolete notions of trust.<\/p>\r\n<p>If you were inside the network perimeter your identity was trusted, which meant that you could log on using nothing more robust than a username and password. Bad people like hackers, by contrast, were always outside the perimeter looking in and would be detected as they passed through security checkpoints such as firewalls.<\/p>\r\n<p>Except, of course, the perimeter was now everywhere, inside and outside the network, on many different devices in many places, including ones that were machines talking to one another and not even people. Simply trusting a digital identity was madness \u2013 identities could be stolen or hijacked by malware too easily.<\/p>\r\n<p>Kindervag\u2019s idea of Zero Trust was based on two simple observations: expecting the perimeter security model to keep people out was doomed because, like a building with draughty doors, modern networks had too many access points and weaknesses for that to work.<\/p>\r\n<p>Second, the logical solution to this was that no device, user, or connection should automatically be trusted without careful verification. Every entity connecting to a network, or within a network, was a potential threat no matter which identity is used, where it was connecting from, and what it was connecting to. Modern malware meant that even legitimate users posed a risk.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>What ZERO Trust Means for SMEs<\/h2>\r\n<p>If there\u2019s a hitch with Zero Trust it\u2019s that while it tells organisations what to do, it doesn\u2019t tell them how to do it.\u00a0 Making it work on the ground can be daunting because it leaves open the whole question of implementation.<\/p>\r\n<p>For example, should organisations ditch unreliable security protections such as passwords and impose tougher authentication?\u00a0 That sounds straightforward until the organisation discovers it still depends on a hard-to-replace legacy application that can\u2019t verify using anything else.<\/p>\r\n<p>Another issue is that once you abolish trust, that means nothing should trust anything. Networks no longer trust remote users while users should no longer trust networks in return. The need to authenticate things increases dramatically. In a sense, everything \u2013 users, devices, applications, and data &#8211; becomes its own perimeter, monitoring everything else with suspicion.<\/p>\r\n<p>But it gets worse. Should devices even trust themselves? After all, sophisticated malware can lurk hidden inside a single application or piece of low-level firmware anti-virus can\u2019t monitor. This suggests that PCs should have their own internal gateways that constantly check and verify each other.<\/p>\r\n<p>Networks this paranoid can\u2019t function easily, even if organisations knew how to build them. It\u2019s a world where far from disappearing, perimeters and firewalling are everywhere &#8211; inside networks, inside devices, and inside applications. It\u2019s an interesting vision but it\u2019s a potentially very complicated one.<\/p>\r\n<p>In fact, we\u2019re starting to see the first implementations of these principles in developments such as <a href=\"https:\/\/www.hp.com\/gb-en\/security\/endpoint-security-solutions.html\" target=\"_blank\" rel=\"noopener\">HP\u2019s Wolf Security<\/a>, a suite of verifications built into PCs from the firmware level up. Building on the Trusted Platform Modules (TPMs) already used in PCs to guard cryptographic keys, soon every business PC could have this sort of technology built in.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Future Challenges Presented by Zero Trust Approaches<\/h2>\r\n<p>One phenomenon that has sharpened interest in zero trust ideas is the movement for more people to work from home, something which decreases how much security teams can see in ways that raise the chances of a compromise.<\/p>\r\n<p>An unintended short-term consequence could be that organisations take a shortcut to Zero Trust by locking down their remote users with strict policies, limited privileges, and contract penalties for anyone who tries to bypass this. This could easily start to exact a toll as users struggle with regular verification checks, killing productivity.<\/p>\r\n<p>Despite these uncertainties, there\u2019s little doubt Zero Trust is already a big influence and is here to stay. Most likely, the next generation of malware will respond to Zero Trust with new strategies to tunnel between trust zones. Zero Trust will make life harder for attackers, but it absolutely won\u2019t stop them from trying.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>NCSC Zero Trust<\/h2>\r\n<p>The <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/zero-trust-architecture\" target=\"_blank\" rel=\"noopener\">National Cyber Security Centre<\/a> offers eight principles around which organisations should implement Zero Trust network architecture:<\/p>\r\n<ul>\r\n\t<li>Know your architecture, including users, devices, services and data<\/li>\r\n\t<li>Know your User, Service and Device identities<\/li>\r\n\t<li>Assess your user behaviour, devices and services health<\/li>\r\n\t<li>Use policies to authorise requests<\/li>\r\n\t<li>Authenticate &amp; Authorise everywhere<\/li>\r\n\t<li>Focus your monitoring on users, devices and services<\/li>\r\n\t<li>Don&#8217;t trust any network, including your own<\/li>\r\n\t<li>Choose services designed for Zero Trust<\/li>\r\n<\/ul>\r\n<p>For further information about Zero Trust policies, including how best to implement them, you can find out more on the <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/zero-trust-architecture\/introduction-to-zero-trust\" target=\"_blank\" rel=\"noopener\">NCSC website<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"Zero Trust is an increasingly popular concept within cyber security and it\u2019s one that business owners should be paying careful attention to.","protected":false},"author":24,"featured_media":6252,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[32],"class_list":["post-6251","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is Zero Trust and How Should Business Owners Implement It?<\/title>\n<meta name=\"description\" content=\"Zero Trust is an increasingly popular concept within cyber security and it\u2019s one that business owners should be paying careful attention to.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Zero Trust and How Should Business Owners Implement It?\" \/>\n<meta property=\"og:description\" content=\"Zero Trust is an increasingly popular concept within cyber security and it\u2019s one that business owners should be paying careful attention to.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T16:16:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/What-is-zero-trust-and-how-should-business-owners-implement-it-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"294\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Zero Trust and How Should Business Owners Implement It?","description":"Zero Trust is an increasingly popular concept within cyber security and it\u2019s one that business owners should be paying careful attention to.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/","og_locale":"en_GB","og_type":"article","og_title":"What Is Zero Trust and How Should Business Owners Implement It?","og_description":"Zero Trust is an increasingly popular concept within cyber security and it\u2019s one that business owners should be paying careful attention to.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/","og_site_name":"Amtivo UK","article_modified_time":"2025-12-15T16:16:00+00:00","og_image":[{"width":500,"height":294,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/What-is-zero-trust-and-how-should-business-owners-implement-it-.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/","name":"What Is Zero Trust and How Should Business Owners Implement It?","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/What-is-zero-trust-and-how-should-business-owners-implement-it-.png","datePublished":"2025-08-15T13:53:46+00:00","dateModified":"2025-12-15T16:16:00+00:00","description":"Zero Trust is an increasingly popular concept within cyber security and it\u2019s one that business owners should be paying careful attention to.","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/What-is-zero-trust-and-how-should-business-owners-implement-it-.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/What-is-zero-trust-and-how-should-business-owners-implement-it-.png","width":500,"height":294,"caption":"What is zero trust and how should business owners implement it"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/what-is-zero-trust-and-how-should-business-owners-implement-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"What Is Zero Trust and How Should Business Owners Implement It?"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":3,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6251\/revisions"}],"predecessor-version":[{"id":6998,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6251\/revisions\/6998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/6252"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=6251"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=6251"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=6251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}