Building Zero Trust: 19 Practical Steps Inspired by NIST’s Latest Guidance
- Aaron Terrey
- May 31
- 3 min read
As threats grow more sophisticated and perimeter-based defences become increasingly ineffective, Zero Trust Architecture (ZTA) has emerged as a critical model for modern security. It’s not just a trend - it's becoming a baseline expectation across sectors dealing with sensitive data, physical infrastructure, and complex regulatory obligations.
In June 2025, the U.S. National Institute of Standards and Technology (NIST) released a refreshed perspective on Zero Trust, outlining 19 actionable ways to strengthen and operationalise ZTA. The initiative builds on earlier NIST frameworks and aims to help organisations of all sizes bridge the gap between Zero Trust theory and real-world implementation.
At Vixels, we’ve broken down NIST’s guidance into plain language, mapped it to practical use cases, and added perspective based on what we see in high-accountability environments - from critical infrastructure and retail networks to government systems.
1. Identity is the New Perimeter
Verify every user and device before access is granted. Use multi-factor authentication, biometrics, device health checks, and role-based controls - especially where high privacy or safety risks exist.
2. Make Access Context-Aware
Static access rules are no longer enough. Consider time of day, geolocation, recent behaviour, and device posture in every access decision.
3. Practice Least Privilege, Relentlessly
Limit access to only what’s needed - no more, no less. This reduces the blast radius in case of a breach and helps meet compliance standards.
4. Segment with Purpose
Microsegmentation, software-defined networking, and layered zones help prevent lateral movement once an attacker is inside.
5. Monitor, Detect, and Learn
Real-time monitoring, behavioural analytics, and anomaly detection tools should be active and tuned to your environment.
6. Protect Data Everywhere
Data must be encrypted at rest and in transit. Include surveillance footage, identity records, and operational logs in your protection scope.
7. Define Trust Boundaries
Make it clear where organisational control starts and ends - across cloud, hybrid, on-prem, and third-party environments.
8. Insert Control Points
Use secure gateways, access brokers, or data guards to inspect and enforce policy at every junction.
9. Secure APIs and Machine-to-Machine Interactions
APIs and automated systems require strong identity and access protocols - including cryptographic signatures and mutual TLS.
10. Automate Policy Enforcement
Where possible, remove manual approval workflows. Let policies and risk engines make fast, consistent decisions.
11. Assess Device Integrity
Build device posture into your trust model. Out-of-date firmware or unapproved apps should trigger tighter access control.
12. Extend Zero Trust to the Cloud
Zero Trust doesn’t stop at the edge. Cloud workloads and SaaS applications must be governed by the same access and visibility rules.
13. Simplify Policy Structures
If your access rules are too complex to explain, they’re too complex to enforce. Policies should be standardised, reviewed, and easy to test.
14. Use Live Data to Guide Access
Decisions should be based on current data - not assumptions. Risk scores, real-time telemetry, and user history all matter.
15. Don’t Trust Locations
Being in the office or on a "secure" network doesn’t mean someone should have access. All access must be independently validated.
16. Assume No Request is Safe
Even known users and devices should face the same scrutiny. Re-authenticate and re-authorise frequently.
17. Build Trust from Hardware Up
Use secure boot, TPM, or other hardware-based methods to establish trust in system integrity - especially in mission-critical environments.
18. Design for Interoperability
Zero Trust works best when systems talk to each other. Choose solutions that support open standards and cross-domain integration.
19. Log Everything, Review Often
Every decision point should be logged. Detailed audit trails are critical for investigations, compliance audits, and continuous improvement.
Why NIST’s Zero Trust Push Matters
NIST has long been a global benchmark-setter in risk management. Their Zero Trust initiative offers governments, enterprises, and operators a clear, practical path to strengthening digital defences - one that’s vendor-agnostic, scalable, and grounded in real threats.
At Vixels, we help organisations put this guidance into action - whether through Zero Trust assessments, integrated identity and access programs, or privacy-by-design implementations for physical and digital environments. We understand the unique challenges of sectors where compliance isn’t optional, and risks extend beyond IT.
Looking to start or strengthen your Zero Trust journey? Vixels works alongside your internal teams and external partners to design, implement, and operationalise controls aligned to NIST’s best practice - across surveillance systems, facial recognition implementations, analytics platforms, and critical business operations.