CyberLeveling Logo
Zero Trust in Practice

Zero Trust in Practice

What Phase One and Phase Two Really Mean for Security Teams

Zero Trust is one of the most widely referenced security concepts of the last decade.

It is also one of the most misunderstood.

Many organizations say they are “doing Zero Trust” because they have deployed new tools, reworked identity controls, or segmented parts of their network. Others point to maturity models and frameworks that describe where they want to be in the future.

The reality for security teams on the ground is far less clean.

This article is not a summary of Zero Trust policy documents or implementation guidelines. Instead, it translates what Phase One and Phase Two of Zero Trust maturity actually mean in practice for security teams, and why many organizations struggle to move from one to the other.

Why Zero Trust Is Often Misinterpreted

Zero Trust is frequently treated as an architecture problem.

If we redesign networks, add identity controls, and deploy the right platforms, security will improve.

That framing is incomplete.

Zero Trust is fundamentally about decision-making under uncertainty:

  • deciding what is allowed
  • deciding what is trusted
  • deciding how much access is acceptable
  • deciding how risk is reduced when assumptions fail

Tools support those decisions, but they do not replace them.

This is why many organizations claim Zero Trust progress while security teams still experience the same operational failures.

Phase One: Establishing a Defensible Baseline

Phase One of Zero Trust maturity is about creating a foundation that makes security decisions possible.

In practice, Phase One is not about being “secure.”
It is about becoming legible.

What Phase One Is Really Trying to Achieve

Operationally, Phase One aims to answer basic but critical questions:

  • What assets exist?
  • Who and what can access them?
  • Under what conditions is access granted?
  • What identity signals are relied upon?
  • What enforcement points actually exist?

If a security team cannot answer these consistently, Zero Trust is not achievable.

Phase One is about reducing ambiguity.

What Phase One Looks Like for Security Teams

For SOCs, IR teams, and defenders, Phase One typically results in:

  • clearer asset inventories
  • more consistent identity enforcement
  • fewer implicit trust relationships
  • better-defined access paths
  • improved visibility into authentication and authorization events

Importantly, Phase One does not eliminate risk.

It limits chaos.

Security incidents still happen. Alerts still fire. Misconfigurations still exist. But the environment becomes easier to reason about.

What Phase One Does Not Solve

This is where expectations often break.

Phase One does not:

  • stop attackers from getting initial access
  • eliminate alert noise
  • guarantee detection quality
  • prevent lateral movement on its own
  • fix organizational decision-making

Many teams mistake Phase One completion for maturity.

That is where progress stalls.

The Gap Between Phase One and Phase Two

Most organizations get stuck here.

They have:

  • improved identity controls
  • segmented some systems
  • deployed Zero Trust-aligned tools

But security outcomes do not improve as much as expected.

Why?

Because Phase Two requires behavioral and operational change, not just architectural change.

Phase Two: Enforcing Trust Decisions at Scale

Phase Two of Zero Trust maturity is where things become uncomfortable.

This phase is not about adding more controls.
It is about using existing controls consistently and intelligently.

Phase Two asks harder questions:

  • Are trust decisions adaptive or static?
  • Are access decisions reviewed, tested, and adjusted?
  • Do detections align with Zero Trust assumptions?
  • Do security teams trust their own enforcement mechanisms?
  • Can the organization respond when trust assumptions fail?

This is where Zero Trust becomes real.

What Phase Two Actually Changes for Security Teams

In practice, Phase Two impacts daily security work in several ways:

  • detections must be context-aware
  • alerts must reflect trust violations, not just events
  • identity misuse becomes a primary signal
  • access anomalies matter more than perimeter events
  • incident response relies on enforced segmentation and identity controls

Phase Two exposes weaknesses that Phase One hides.

If rules are noisy, they become unmanageable.
If access reviews are theoretical, they break under pressure.
If trust decisions are not maintained, they silently decay.

Why Phase Two Is So Hard

Phase Two fails not because teams lack tools, but because:

  • maintaining controls is harder than deploying them
  • dynamic decisions require judgment
  • false positives create organizational friction
  • enforcement creates business resistance
  • mistakes become visible and costly

Phase Two demands maturity in people, processes, and expectations.

That is why many organizations stall.

The SOC Reality Under Zero Trust

From a detection and response perspective, Zero Trust maturity changes what “good” looks like.

In Phase One:

  • SOCs gain visibility
  • alerts increase
  • noise often grows

In Phase Two:

  • alerts should become more meaningful
  • identity and access anomalies matter more
  • context becomes essential
  • correlation matters more than volume

If SOCs are not included in Zero Trust planning, the result is often:

  • more alerts
  • more complexity
  • more burnout
  • little improvement in detection quality

Zero Trust without operational alignment creates strain, not security.

Common Misconceptions That Break Zero Trust

Several patterns repeat across organizations.

  • believing Zero Trust is a finished state
  • assuming tools enforce maturity automatically
  • treating identity as static
  • ignoring maintenance and validation
  • separating architecture from detection
  • underestimating human decision-making

Zero Trust maturity is not a destination.
It is a continuous negotiation between risk, access, and reality.

Zero Trust and Incident Response

Zero Trust does not prevent incidents.

What it should do is:

  • limit blast radius
  • slow attackers down
  • increase defender confidence
  • reduce uncertainty during response

If incident responders cannot rely on identity controls, segmentation, and enforcement during an incident, Zero Trust is theoretical.

Phase Two maturity is visible during failure, not success.

How Security Teams Should Think About Phase One and Phase Two

A useful mental model is this:

Phase One makes the environment understandable.
Phase Two makes it defensible under pressure.

If your organization is still debating asset ownership, access visibility, or enforcement consistency, Phase Two will fail.

If your organization cannot tolerate enforcement mistakes or adaptive controls, Phase Two will stall.

Zero Trust maturity is as much about organizational readiness as technical readiness.

So What?

Zero Trust does not fail because the model is flawed.

It fails because organizations underestimate what maturity requires after the architecture is in place.

Phase One is about clarity.
Phase Two is about discipline.

Security teams should not measure Zero Trust progress by the number of controls deployed, but by how confidently they can answer these questions:

  • Do we understand who can access what, and why?
  • Can we detect when trust assumptions fail?
  • Can we enforce decisions without creating chaos?
  • Can we adapt when reality changes?

Zero Trust in practice is not about eliminating trust.
It is about making trust explicit, testable, and survivable when it breaks.

Reference Documents

This article is informed by publicly available Zero Trust Implementation Guidelines that outline Phase One and Phase Two maturity targets for large enterprise environments.

These documents are comprehensive, policy-driven, and primarily intended for organizations operating at significant scale and regulatory complexity. They provide architectural and governance detail that goes far beyond what is practical to summarize in a single post.

Readers who want to explore the source material directly can find them here:

This article does not attempt to restate or replace those documents.
Its purpose is to translate their intent into operational reality for security teams working with real constraints.