top of page
Search

Zero Trust Can’t Be Bought — And That’s the Part Most Organizations Miss

  • Kostas Tsiolas
  • Feb 8
  • 3 min read

Zero Trust is often discussed as if it were a product. Something you buy, deploy, and check off.

It isn’t.

Zero Trust is a fundamental shift in how an organization thinks about access, control, and risk. Technology supports it — but technology alone cannot create it.

The old security model assumed trust once someone was “inside” the network. That assumption no longer holds.

Not with cloud services. Not with remote work. Not with third-party vendors. Not with privileged access. Why Zero Trust can’t be bought

Executives are often told:

  • “Buy this Zero Trust solution”

  • “Enable these Zero Trust features”

  • “Deploy Zero Trust architecture”

What they are rarely told is this:

Zero Trust is a governance decision first, a technical implementation second.

You can buy tools that enable Zero Trust principles. You cannot outsource:

  • risk ownership

  • access decisions

  • accountability

If leadership has not decided who is trusted, under what conditions, and for how long, no tool will solve the problem. What Zero Trust actually requires

At its core, Zero Trust answers a small set of uncomfortable questions:

  • Who is accessing what?

  • Why do they need it?

  • From where?

  • For how long?

  • What happens when something changes?

These are business questions, not technical ones.

Technology can enforce decisions — but it cannot make them.

Examples: how Zero Trust applies in practice

Employees

Old model: Once logged in, broad access is assumed.

Zero Trust mindset:

  • Access is tied to role, context, and purpose

  • Access is reviewed, adjusted, and removed

  • Being an employee does not mean blanket trust

Administrators

Old model: Admins are trusted because they are admins.

Zero Trust mindset:

  • Privileged access is time-bound

  • Actions are logged and attributable

  • Standing admin rights are minimized

  • Trust is conditional, not permanent

Vendors and third parties

Old model: Vendors are trusted because they have a contract.

Zero Trust mindset:

  • Vendors get only what they need

  • Access expires automatically

  • Vendor access is treated as high risk by default

  • Accountability is explicit, not assumed The audit questions that matter (with evidence)

    Auditors, regulators, and customers are no longer satisfied with statements. They ask for proof.

    Can your organization answer — with evidence — questions like:

    • Who approved this access, and why?

    • How do you know access is still required?

    • How quickly can access be revoked?

    • How are privileged actions monitored?

    • How is third-party access controlled and reviewed?

    If the answer relies on:

    • tribal knowledge

    • “we trust our people”

    • screenshots instead of records

    Zero Trust is not actually in place.



Questions to ask your management team tomorrow

These are leadership questions — not technical ones:

  • Who owns access risk in this organization?

  • What access would worry us most if compromised?

  • Which users or vendors have access “just in case”?

  • How do we prove access decisions were intentional?

  • What decisions are we delegating to tools instead of making explicitly?

The quality of these answers determines your security posture more than any product.



This is not about technology

Zero Trust is not a firewall upgrade. It’s not an identity feature. It’s not a checkbox in a cloud portal.

It is about:

  • risk tolerance

  • decision ownership

  • accountability

  • control

Technology helps you enforce Zero Trust. Leadership decides whether it exists.



Final thought

If Zero Trust feels expensive, complex, or disruptive, it’s usually because it’s exposing decisions that were never clearly made.

You don’t buy Zero Trust. You decide to operate that way — and then you implement it.

And that decision always starts at the top.

 
 
bottom of page