What is zero trust network access (ZTNA) and how can your business implement it?
ZTNA can help protect your business applications and data from cyber attacks
Max Slater-Robins
Zero trust has become one of the most discussed cybersecurity strategies of recent years, reshaping how organisations of all sizes think about securing their networks and data. Zero trust network access (ZTNA) is one of the key technologies that brings this philosophy to life.
By applying granular, identity-driven controls to how users and devices connect with applications, ZTNA helps limit the reach of attackers, reduce the risks of credential compromise, and support increasingly distributed workforces.
Rather than relying on traditional perimeter defenses that implicitly trust anything inside the corporate firewall, ZTNA takes a zero trust approach that treats every user, device, and connection as potentially hostile until proven otherwise.
Unlike virtual private networks (VPNs) – which typically grant broad network access once authenticated – ZTNA only permits access to specific resources, and makes these decisions based on continuous checks of who the user is, their device, and the context of their request.
To help you make sense of ZTNA, we’ll look at what it is in more depth and explore why it’s proving so useful for modern organisations. We’ll also consider the limitations you need to be aware of, and how to go about selecting and implementing the right tools.
What is ZTNA and why is it useful?
In simple terms, zero trust network access (ZTNA) is a security framework built on the principle that no user or device should be trusted by default, whether inside or outside the corporate network.
Unlike older models that assume anything behind the firewall is safe, ZTNA insists on verifying each access attempt, enforcing strict identity and context checks before permitting entry to specific applications or services.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Central to most ZTNA platforms is the concept of a software-defined perimeter (SDP).
Traditional networks often expose broad sections of infrastructure to anyone inside. An SDP, by contrast, makes applications effectively invisible to unauthorised users. These resources only become visible once a user has authenticated and is explicitly approved for access.
Traditional networks often expose broad sections of infrastructure to anyone inside. An SDP, by contrast, makes applications effectively invisible to unauthorized users. These resources only become visible once a user has authenticated and is explicitly approved for access.
This is possible because an SDP separates the control plane from the data plane. The control plane handles user authentication, authorization, and policy enforcement, while the data plane manages the actual traffic between a user’s device and the application.
ZTNA usually integrates tightly with identity providers (IdPs) and relies on single sign-on (SSO) systems. Once a user authenticates via SSO – often through SAML or OAuth – their identity is continuously checked against policy rules.
Unlike VPNs, which grant wide-reaching network access after initial authentication, ZTNA establishes encrypted “micro-tunnels” on a per-application basis. Users connect only to the specific services they’re authorized for, meaning that even if credentials are compromised, attackers can’t easily roam across the network.
ZTNA also supports continuous trust assessment. Where VPNs typically verify users once at the start of a session, ZTNA platforms can keep evaluating trust signals in real time.
For most organizations, the appeal is clear: ZTNA cuts down the attack surface by hiding applications from unauthorised view and limits lateral movement by restricting each user to just what they need.
What are the limitations of ZTNA?
While ZTNA brings clear security advantages, it isn’t a complete solution on its own. In 2025, with so many potential threats for organisations of all sides, sadly nothing is perfect.
Most ZTNA tools primarily protect access at the application layer, so organizations still need to secure other areas such as endpoint devices, DNS queries, and email systems. Without layered defences, malware or phishing attacks can still slip through.
ZTNA also relies heavily on your identity infrastructure. If your identity provider or SSO platform experiences downtime, a misconfiguration, or some other issue, it can prevent users from accessing critical applications entirely.
Similarly, if credentials are compromised at the IdP level, attackers might still navigate through multiple applications despite ZTNA policies, underscoring the need for strong multi-factor authentication.
Another challenge is supporting legacy systems or protocols that aren’t web-based. Many older apps may not integrate neatly with ZTNA or modern identity frameworks, requiring additional gateways or reengineering to fit, much to the chagrin of your IT department.
ZTNA can also create user friction if posture checks or multi-factor requirements are too aggressive or poorly tuned. If legitimate users are frequently blocked or delayed, it can undermine productivity and fuel resistance to security initiatives.
How can I choose the best ZTNA tools?
Selecting the right ZTNA platform starts with ensuring it fits your organization’s identity strategy.
Look for solutions that integrate tightly with your existing identity providers and SSO platforms, whether that’s via SAML, OAuth, or OpenID Connect. Strong identity support underpins granular policies and smooth user experiences.
It’s also important to check how well the tool separates the control and data planes, a core principle of software-defined perimeter designs, to ensure that policy decisions and user authentication happen independently from the actual traffic flow.
Continuous risk assessment is another key factor. Leading ZTNA tools evaluate device health, location, and behavioural patterns in real time, adjusting access if something changes. This adaptive approach is far safer than static, one-time checks.
Finally, look for rich analytics and reporting. Detailed logs and dashboards make it easier to demonstrate compliance and spot unusual patterns. A mature ZTNA platform should do more than block access; it should give you visibility to continuously improve your security.
How can your organization implement ZTNA?
As with most IT work, rolling out ZTNA starts with careful planning. Map out which apps and user groups need protection, identifying who accesses what – and under which conditions – so you can build precise policies without blocking essential work.
Next, a strong identity foundation is essential. Since ZTNA relies on robust authentication, your identity provider and SSO platforms must be resilient and correctly configured. Combining these with multi-factor authentication (MFA) reduces the risks of credential theft.
Introducing ZTNA in phases also often works well, and piloting with higher-risk groups – like contractors or third-party partners – gives IT teams the chance to adjust posture checks, policies, and exception handling before scaling across the business.
Additionally, integrating endpoint compliance checks further strengthens security by ensuring only secure, patched devices can connect, preventing older or unmanaged machines becoming an easy entry point.
Clear communication with employees helps build trust and smooth adoption.
Explaining how continuous checks and MFA protect both users and data – while SSO simplifies day-to-day access – can ease concerns and keep productivity high. With the right planning and support, organizations can transition to ZTNA confidently, gaining tighter control over access without adding unnecessary friction.
Kate O'Flaherty is a freelance journalist with well over a decade's experience covering cyber security and privacy for publications including Wired, Forbes, the Guardian, the Observer, Infosecurity Magazine and the Times. Within cyber security and privacy, her specialist areas include critical national infrastructure security, cyber warfare, application security and regulation in the UK and the US amid increasing data collection by big tech firms such as Facebook and Google. You can follow Kate on Twitter.
-
Ransomware negotiator sentenced for role in major cyber crime groupNews Deniss Zolotarjovs was a key player in a group associated with Conti
-
Everything you need to know about ChatGPT’s new Advanced Account Security featuresNews OpenAI has introduced new tools to tightening up access to ChatGPT, Codex, and its other AI tools
-
Securing the supply chain: Why zero trust and recovery readiness are non-negotiableIndustry Insights To prevent supply chain attacks, suppliers must be embedded in trusted business architecture
-
What security teams need to know about the NSA's new zero trust guidelinesNews The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices
-
Fears over “AI model collapse” are fueling a shift to zero trust data governance strategiesNews Gartner warns of "model collapse" as AI-generated data proliferates – and says organizations need to beware
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
Research shows the financial benefits of implementing zero trustNews With zero trust shown to drastically reduce the number of cyber incidents, insurers are catching on and lowering premiums
-
Microsoft ramps up zero trust capabilities amid agentic AI pushNews The move from Microsoft looks to bolster agent security and prevent misuse
-
Zero trust gains momentum amid growing network visibility challengesNews Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to successNews Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
