Conf42 Machine Learning 2025 - Online

- premiere 5PM GMT

Beyond Perimeters: Implementing Zero Trust at Enterprise Scale

Video size:

Abstract

In today’s distributed enterprise landscape, where organizations operate across multiple cloud providers and remote work has dramatically expanded attack surfaces, traditional perimeter-based security has become dangerously inadequate. This session presents a comprehensive framework for implementing Zero Trust Architecture (ZTA) at scale, based on real-world implementations that have demonstrated significant reductions in breach costs. We’ll explore the three pillars of effective Zero Trust implementation: identity-centric security (with enterprises now managing multiple complex identity systems), microsegmentation (substantially reducing breach scope compared to traditional approaches), and contextual access policies (with organizations implementing data-centric controls reporting fewer exfiltration incidents). Despite clear benefits, only a small fraction of organizations have fully implemented Zero Trust enterprise-wide, with many citing legacy system integration as their primary barrier. This session will provide actionable strategies for overcoming these challenges, including proxy-based access controls for legacy systems, service mesh integration for microservice environments (with mTLS as a foundation), and risk-based authentication that adapts to threat intelligence. Drawing on implementation data from organizations across various maturity levels, attendees will learn how to navigate the technical complexities of Zero Trust while maintaining performance and aligning with DevSecOps practices. Whether you’re still in planning stages or implementing in specific areas, this presentation offers a structured roadmap for securing your distributed enterprise in an environment where most breaches are attributable to human error despite existing perimeter controls.

Summary

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hello, Griffin. I'm Navin Kumar Beru. I'm truly honored to be here at conference 42 ML 2025. Today's talk is going to be about Beyond Perimeters, implementing Zero Trust at Enterprise Scale. In this session, I want to go beyond the hype and breakdown what Zero Trust really means, why it is not just a security password, but a fundamental architectural shift that enterprises need to survive and thrive in today's cloud driven distributed world. Zero Trust has become one of the most important strategies for modern enterprises, especially those operating across multi-cloud environments, different geographies, and supporting remote workforces. In this presentation, I will walk you through key concepts, shared data points, and highlight real world implementation challenges and outcomes. Thank you for spending time with me. Let's get started. Evolving digital landscape. Let's begin by painting the landscape we are operating in today. 76% of enterprises run multi-cloud environments spanning across average 3.7 cloud providers, creating a highly complex, interconnected system. Despite investments and tenter defense, 95% of reaches still result from human error, phishing attacks, misconfigurations accidental exposure. Breach costs are in class now, averaging around 4.8 million 10.7 increase from last year. These trends show that traditional perimeter based defenses are no longer enough to effectively protect modern enterprises. We need a model that assumes breaches will happen and focus minimizing impact the business case for zero trust. So why zero trust. Because organizations that embrace mature zero trust programs save around 1.4 million on an average for breach. Adoption has skyrocketed 49% of enterprise support progress and zero trust initiatives up from 21% just a few years ago. This shift is practically driven by remote work, which has expanded attack services by 37%, adding, unmanaged devices, unsecured networks, and external access funds Beyond security, zero trust offers business benefits like greater rigidity, safer cloud adoption, and stronger regulatory realignment. I think it's an essential for business. From perimeter to zero trust. Zero trust requests a fundamental mind shift. Instead of assuming that everything inside the network is trusted, we follow three principles. Continuous verification. Every request is checked every time. Identity based trust s are based on identity, not on location. No default trust. Nothing is implicitly trusted. Even inside the network, this shift matters because 70% of today's traffic moves from east West, inside the perimeter, the Old Castle and motor approach leaves too many gaps open with zero trust. The trust becomes something you earn, not something you inherit. Identity centric security identity is the heart of zero trust in this model. Identity becomes a new perimeter, whether it's a person, device, or a workload. According to Nest. All resource authentications and authorizations are dynamic and strictly enforced before access is allowed. But this is challenging. 92% of enterprises use multiple identity systems, making it inconsistent and hard. Implementing leading implementations now adopt continuous authentications, checking identity at multiple points during a session, not just at the login. This has resulted in 37% reduction in identity based compromises proving the power of strong identity centered defenses. In short, identity management becomes the foundation for all security layers. Micro segmentation is another key zero trust complement rather than managing. Network zones, you apply granular control. At workload level, 76% of enterprises now implement software defined segmentation, which controls ease to best traffic. By ensuring that only explicit allowed services communicate, you reduce the breach by 66%. In segmented environments, micro-segmentation effectively limits lateral movement, turning what could have been a system-wide breach into a small contained incident. It reinforces the principle of least coverage at the network level. Cutting off attack pathways before the spread. Contextual access policies, dynamic access policies are central to zero trust. They rely on combining multiple factors such as user identity and behavior patterns. Device health assessed by 83% of enterprises request context like locational time data sensitivity. Ensuring sensitive resources get extra protection. By layering this control organizations create adaptive risk of access decisions. The result, 37% of infiltrate exfiltration incidents showing that smart policies make a real impact. This isn't just a static role based access, but it's a applying context over every decision. Again, dynamic policy and enforcement is central to zero trust implementation. Witness defining a core tenant that access to resources is determined by dynamic policy, including the observable state of client identity, application, service, and requesting asset. The result is that zero trust, security effectiveness. Increases in lot of areas, reduction in exploitable attacks at first by 41% reduction in breach scope based of microsegmentation by 66% reduction in data filtration instance by 37%, and reducing identity based compromise instance by 37%. Current state of zero trust adoption. Let's look where most organizations are today. Oh. Only 8% have fully implemented zero trust across their enterprises. But for others, the pro process is under the way. NI 90, sorry, 49% are actively applying zero trust and key areas, and 34% are still planning their approach. This highlights the implementation gap between early pilots and fully enterprise coverage. Zero trust takes time. It's not a plug and play solution. It requires careful strategy, phase rollout, and alignment across various teams. Federated identity management. Managing identities across a large, complex organization is one of the hardest zero trust challenges, mainly because identity, confidence gap. Only 29% of the organizations are already confident in their identity security controls creating a significant challenges for zero trust implementations. Privileged IDENT Identity Management is 57% of the organizations Report U using privileged identity management and solutions as a part of the Zero Trust approach machine identity. 73% of the organizations report managing more machine identities that humans human identifies, creating an expanded identity surface requiring consistent security controls. Large organizations must, I must implement, it must implement federated identity solutions that provide seamless, yet secure across distributed environments. The identity confidence gap creates significant challenge as 89% of organizations have experienced at least one identity related breach in recent years. End-to-end encryption, zero. Trust demands persuasive encryption, protecting data no matter where it travels. This includes encrypting data transit data trust, securing a PA communications, protecting EastWest microservice traffic, and implementing robust key management practices. Zero trust requires encryption to protect data throughout its life cycle, emulating implicit trust in network boundaries or transport mechanisms. Research shows encryption is one of the fourth most common controls supporting zero trust initiatives. This shift reduces reliance on network boundaries and ensures that even intercepted data remains producted. It's about making sure that data sensitive information is always secure, and even on unru channels distributed policy enforcement, zero trust requests. Enforcing policies consistently at multiple levels. Network layer, the secure gateways with secure gateways and next gen firewalls. 57% of organizations imple implement secure gateways as a part of the zero trust policy proving foundational security through next generation firewalls and secure access through SAS E Solutions service. Meh layer using MTLS and fine game controls. Finding control policy in a containerized environment enables zero trust principles to modern application architectures with service to service communication. Securing the MTLS communication between each service application layer, applying rules through a PA gateway degrees, that all a PA access and others to zero trust policies with comprehensive authentication authorization for each request. Policy enforcement must occur at multiple layers within the technology stack to implement zero trust principles effectively at enterprise scale. This architectural approach to policy improvement returns a critical success factor with 70% of the organizations reporting through difficulty and incorporating consistent policy enforcement during distributed environments. Without uniform policy informants gaps appear and attackers look for those inconsistencies. Effective policy enforcement is not just about tools. It's about ensuring alignment across technology stack. Comprehensive observability is true backbone of a successful zero trust implementation. Without it, you are operating blind and in today's fast moving environment, there's a risk. No op, no organization can afford. To succeed, you need a visibility across entire stack from infrastructure to application, from network to user behavior. This means that you're not just collecting raw data, but you're turning it into meaningful insights that can drive action. Key components include secure event collection across all the systems, cloud and on-prem, comprehensive visibility enabling both proactive threat identification and effective incident response. Behavioral analysis to establish baseline studies and quick, quickly identify unusual patterns, establish baseline behaviors and identify deviations that may indicate security threats of automated responses that contain threats, the the moment they're detected, enabling rapid mitigation of potential threats before they can cause significant damage. Cons, consistent feedback loops where real time data helps fine tune policies and controls over time. Leverage operational data towards adjust security controls based on environmental conditions. Currently, 42% of the organization support expanding their logging, monitoring, and telemetry efforts as a part of the zero trust journey, but achieving comprehensive observability about more than just tools. It's about designing the systems that integrate visibility, nativity, and not an after that a thought. Remember, you cannot secure what you cannot see. Zero trust requires full situational awareness across systems, identities, devices, and networks. The more you know about the environment, the faster, the more precise, precisely you can act. When something goes wrong. Ultimately, I've done zero trust, zero trust from a static policy framework into a living adaptive security posture. Let's talk about service mis integration. When we talk about S securing Cloud native application service me, service meshes like STO Linkerd or a WS app mesh become central to zero trust. They aren't just networking tools. They're embedded deeply into how microservice communicate to communicate with each other. Serviceness provide critical capabilities including MTLS, mutual TLS, ensuring that every service to service inter interaction is authenticated and encrypted. All service to service communication is authenticated and encrypted. Explicit access policies defining exactly which services are allowed to talk to each other. Can make zero trust, easy to implement. Services can only communicate with explicit authorized endpoints. Telemetry collection is another important feature of zero miss integration, gathering rich telemetry data on communication patterns, errors, latency is critical for telemetric collections. Detailed metrics on communication patterns reveals potential security anomalies. Cryptographic workload identities. This gives services unique verifiable identities that are hard topo cryptographic identities for services that can easily be spoofed. By integrating these features directly into the application layer, organizations can and for zero trust at a granular service level, service to service level communications. This reduces the risk of lateral movement. Even if one part of the system is compromised, the other parts stay minimal impact. It also provides better visibility on how applications behave, enabling tighter controls and faster detection of anomalies without the service mass. Mass integration, zero trust efforts and mic Microsoft microservice and environments often fall short, leaving gap for attackers that GA, that possibly could be exploited. Think of a service mesh as a connective tissue that holds zero trust principles and high dynamic cloud architectures. It's not about improving security, it's about building resilience, scalability, and adaptability into the heart of the system. Service mesh like. SST O like we talked about, linker. DAWS mesh ate zero trust by providing critical security capabilities for containerized microservice environment. Service mesh provide critical capabilities for implementing zero trust and micro microservice environment by creating an architecture by securities embedded within the application infrastructure. Now let's talk about a p security and zero trust. APIs are front doors to modern applications and they're under concentrate. A zero trust framework, API security must be treated as a first class citizen and first class priority, not an afterthought. Securing API involves several key practices deploying API gateway as a centralized centralized enforcement points for all incoming and outgoing, a PA calls. This helps in centralized enforcement points. For applying security policies, implementing authentication requirements for all, a PA consumer, regardless of their network origin, applying rate limit, and anomaly detection to prevent abuse, denial of service attacks, or unexpected spikes. Protecting against this abuse is critical for zero trust. Forcing schema validation to block malformed and malicious payloads that could exploit the backend system. This prevents, this is critical in preventing controls, ensuring that all data passed through a PA others to expected format, preventing common attack techniques like injection attacks. Zero trust for API becomes, goes even further. It means authenticating every API consumer validating authorization for every action and continuously monitoring for suspicious behaviors. A PA often connect to sensitive data, financial transactions, or critical operations, making them prime target for attackers Without strong a PA security, even most well-designed zero trust architectures can be bypassed. Additionally, as organizations and entries open ecosystems working with partners, vendors, and third parties, API Security becomes a vital piece of maintaining trust across extended supply chains. Zero Trust can be applied to APIs to ensure that every single request is evaluated, verified, and ultimately, your zero trust strategy is only as strong as your weakest a PA. Now, let's talk about how to overcome implementation challenge. We can't talk about zero trust without addressing its challenges. Adoption is really smooth and organizations fail and face real practical hurdles. About 60% of security leaders point to legacy system compatibility as one of the biggest obstacles for zero trust policy. Older systems weren't designed for continuous verification or granular access control and retrofitting them can be expensive and time consuming. These. These are also challenges with other tools like sprawl, skill gaps. There are also challenges with skill gaps, cultural resistance, and also alignment across teams. State of trust isn't just a security project, it's a organizational transformation that requires buy-in from leadership, IP operations, and business units. Successful organizations approach zero trust as a structured and stage journey. They start by identifying high value targets, applying zero trust policies. Where they can and applying zero trust principles where they can have biggest impact, and then gradually expanding the output help build momentum. But strong, long-term success requires sustained investment and cross-functional collaboration. The transformation of zero trust architecture presents numerous implementation challenges that organizations must systematically address. Approximately 60% of the security professional site legacy systems as that main concern by decoupling identity from network location, implementing rigorous authentication and authorization, and maintaining continuous verification organization can build resilient security framework that adapt to realities of modern distributed enterprises. It's important to remember that zero trust isn't a product you buy your checkbox, you complete. It's a shift in how organization thinks about trust, access, risk, and a mindset that puts continuous verification at its core. At the end, organizations are that succeed of those that see zero zero trust as a strategic commitment, not as a tactical fix. In closing, thank you all so much for joining me today. I hope the stock gave you a clear understanding on how zero trust cancer enterprise security and give you a realistic sense of what it takes to get there. If you'd like to connect and share insights or continue this conversation, I would love to hear back from you. Thank you again and enjoy the rest of conference 42 ml 2025.
...

Naveen Kumar Birru

Senior Principal Software Engineer @ Palo Alto Networks

Naveen Kumar Birru's LinkedIn account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)