Cybersecurity
Zero Trust in Practice: How to Move From “VPN Thinking” to ZTNA Without Breaking the Business

For years, the default answer to remote access was simple: “Use VPN.” It worked well enough when the perimeter was clear, most apps were inside the office network, and devices were mostly company-managed.
In 2025/2026, that reality is gone. Apps are split across SaaS, data centers, and cloud. Employees work from everywhere. Contractors need access. Devices vary widely. And attackers learned to live inside networks once they get one set of credentials.
Zero Trust is not a product you buy. It’s an operating model: never trust by default, always verify, grant least privilege, and continuously evaluate access. ZTNA (Zero Trust Network Access) is the practical “delivery mechanism” for remote access in that model.
Why “VPN Thinking” Becomes a Security Risk
VPNs extend the internal network to remote users. That sounds convenient—but it also extends risk. Once a device is connected, it often gets broad network reach, and security becomes a race to patch, segment, and detect lateral movement.
- VPN is network-level access: users often get more reach than they need
- Compromised credentials can become “internal presence” within minutes
- Legacy VPN policies are static (IP ranges, groups) and slow to adapt
- Lateral movement becomes easier once the attacker is “inside”
- VPN concentrates trust: one tunnel can open many doors
The problem isn’t that VPN is always bad. The problem is using VPN as your core access strategy without identity-driven controls, device checks, and strict app-level authorization.
What ZTNA Actually Changes
ZTNA flips the model: instead of granting access to a network, it grants access to a specific application or resource—based on identity, context, and device posture. Users don’t “join the network”; they get a controlled, logged path to what they are allowed to use.
- App-level access instead of network-level access
- Identity-first: SSO + MFA + risk policies drive decisions
- Device posture matters: compliant device or restricted access
- Continuous verification: session and risk can be re-evaluated
- Better auditability: who accessed what, when, and from where
The 5 Building Blocks of a Real Zero Trust Rollout
A successful migration is not “replace VPN with ZTNA.” It is a staged improvement of access controls across identity, devices, apps, networks, and logging. These five blocks are the minimum foundation:
- Identity: SSO, phishing-resistant MFA options, conditional access policies
- Device posture: MDM/EDR signals, compliance rules, managed vs unmanaged split
- Application access policies: per-app authorization, least privilege, segmentation
- Network segmentation: reduce lateral movement for what remains on the network
- Observability: centralized logs, alerting, audit trails, and continuous improvement
Table: VPN vs ZTNA – What Changes in Daily Reality
| Area | Classic VPN Approach | ZTNA / Zero Trust Approach |
|---|---|---|
| Access scope | Network-level (often broad) | App-level (least privilege) |
| Decision factors | Group/IP-based (static) | Identity + device + context (dynamic) |
| Lateral movement | Higher risk once connected | Reduced by design (no flat network access) |
| Visibility | Often limited to tunnel/session | Granular per-app logging and policy outcomes |
| User experience | One tunnel to everything | Seamless app access (with strong guardrails) |
| Incident impact | Compromise can spread internally | Blast radius smaller, easier containment |
Start With the Reality Check: Inventory and Access Map
Before you touch technology, map your access reality. Most companies discover that VPN is used for far more than “remote work”—it’s used to compensate for missing SSO, unclear ownership, and old network assumptions.
- List the top 20 internal applications and who uses them
- Identify which apps are web-based, which are client/server, which are legacy
- Map dependencies: databases, file shares, internal APIs, jump hosts
- Classify sensitivity: HR/finance/admin vs general productivity
- Define users: employees, admins, contractors, partners
This becomes your Zero Trust access map. Without it, ZTNA becomes a random rollout that breaks workflows.
Identity-First Policies: The Center of Gravity
Zero Trust works when identity is the control plane. That means: SSO where possible, MFA everywhere, and conditional access policies that reflect business risk—not just convenience.
- Require MFA for all remote access and critical apps
- Make privileged access stronger than normal access
- Use context: location, device compliance, risk signals
- Kill “shared accounts” where possible, or isolate them aggressively
- Enforce least privilege: access per app, not per subnet
Device Posture: The Missing Half of Most Security Programs
In VPN thinking, any device that can authenticate can often connect. In Zero Trust, the device must earn trust. The typical posture checks include OS version, encryption status, EDR presence, and policy compliance.
- Managed devices: allow broader access with strict compliance rules
- Unmanaged/BYOD: restrict to browser-based apps or require additional controls
- Block outdated OS versions and risky configurations
- Use EDR/MDM signals as access inputs (not just monitoring inputs)
Legacy Apps: Avoid the “Big Bang” Trap
Legacy apps are the number one reason companies keep VPN forever. The smart move is to split your migration by application type, not by ideology.
- Quick wins: web apps, admin portals, internal dashboards (move first)
- Medium: RDP/SSH access via controlled gateways and policy enforcement
- Hard: thick clients and legacy protocols (isolate, segment, monitor, plan migration)
If you can’t modernize a legacy app today, contain it: restrict who can reach it, from which devices, and log every access with high fidelity.
A Practical Rollout Plan: 30/60/90 Days
The goal is continuity: users can still work, helpdesk can support, and security becomes measurably stronger over time.
- Days 0–30 (Design & Pilot): inventory, identity readiness, posture rules, pilot group, helpdesk training, logging baseline
- Days 31–60 (Migrate Quick Wins): move top web apps to ZTNA, enforce MFA + posture, build per-app policies, document exceptions
- Days 61–90 (Scale & Harden): expand to departments, migrate admin access, reduce VPN scope, isolate legacy segments, formalize break-glass
Break-Glass and Business Continuity: Don’t Skip This
Every Zero Trust program needs a safe emergency path. Without it, the first outage triggers panic and policy rollbacks.
- Break-glass accounts: minimal, tightly controlled, monitored usage
- Documented recovery workflows: device loss, MFA reset, urgent access
- Time-bound exceptions: never permanent security downgrades
- Change management: approvals for high-risk access changes
How to Prove Progress: Metrics That Actually Matter
You need proof before and after. Otherwise Zero Trust becomes a narrative, not a security improvement.
- Reduction in VPN usage (sessions, bandwidth, user count)
- Blocked sign-ins due to risky context or non-compliant devices
- Number of apps moved to per-app access policies
- Decrease in broad network access (subnets reachable per role)
- Mean time to detect and contain suspicious access attempts
- Helpdesk volume: password resets, VPN issues (before vs after)
Checklist: What a “Good” ZTNA Policy Looks Like
- Every app has an owner and an access policy (not only “VPN users” group)
- Privileged access requires stronger methods and is logged separately
- Unmanaged devices have limited access by design
- Exceptions are documented, time-bound, and reviewed regularly
- Logs are centralized and queryable (who/what/when/from where/why allowed)
Useful References (Standards & Practical Guides)
- NIST SP 800-207 (Zero Trust Architecture): https://csrc.nist.gov/publications/detail/sp/800-207/final
- CISA Zero Trust Maturity Model: https://www.cisa.gov/resources-tools/resources/zero-trust-maturity-model
- Google BeyondCorp (concept and papers): https://cloud.google.com/beyondcorp
- Microsoft Zero Trust guidance: https://www.microsoft.com/security/business/zero-trust
Conclusion: Zero Trust Is a Safer Operating Model, Not a Disruption Project
The best Zero Trust migrations are boring—in a good way. They don’t break the business. They reduce the blast radius, make access auditable, and improve security outcomes step by step.
If you treat ZTNA as a controlled program—identity, device posture, per-app policies, segmentation, and measurable metrics—you can move beyond VPN thinking without chaos and with clear, provable risk reduction.

