Security for Legal SaaS

Episode 26 · Module 6 · Authorization & Access Control

Zero Trust Architecture

19 May 2026 · 8:33 · Security for Legal SaaS

8:33 8:33

For decades, network security operated on a simple assumption: everything inside the corporate network is trusted, everything outside is not. The firewall was the castle wall. If you were inside — physically in the office or connected to the VPN — you could access internal resources freely. That model is dead. Remote work, cloud services, and SaaS applications mean that the "inside" and "outside" distinction no longer exists. A partner working from a hotel in Singapore accesses the same case management system as an associate in the New York office. A legal SaaS platform runs on AWS, not in a server room. The data flows across the public internet.

Today’s Lesson

Security for Legal SaaS — Episode 26: Zero Trust Architecture

The Death of the Network Perimeter

For decades, network security operated on a simple assumption: everything inside the corporate network is trusted, everything outside is not. The firewall was the castle wall. If you were inside — physically in the office or connected to the VPN — you could access internal resources freely.

That model is dead. Remote work, cloud services, and SaaS applications mean that the "inside" and "outside" distinction no longer exists. A partner working from a hotel in Singapore accesses the same case management system as an associate in the New York office. A legal SaaS platform runs on AWS, not in a server room. The data flows across the public internet. The perimeter is everywhere — which means it's nowhere.

Zero Trust is the security model built for this reality. It was first articulated by John Kindervag at Forrester Research in 2010, formalised by NIST in SP 800-207 (2020), and adopted as US federal policy under Executive Order 14028.1

The Three Principles

Zero Trust rests on three principles:

Principle What It Means Legal SaaS Example
Never trust, always verify No entity is trusted by default — not users, not devices, not networks A lawyer on the office VPN still authenticates and authorises for every request
Assume breach Design systems as if an attacker is already inside your network If the database server is compromised, lateral movement to the document store is still blocked
Least-privilege access Every entity gets the minimum permissions needed, for the minimum time needed An associate gets read access to their assigned matters — not all matters, not forever

These principles extend the defence-in-depth concept we covered in Episode 4. Defence in depth layers multiple security controls. Zero Trust makes each layer verify independently — no layer assumes a previous layer already checked.

NIST SP 800-207: The Architecture

NIST SP 800-207 defines three core components of a Zero Trust Architecture:1

Component Role Implementation
Policy Engine (PE) Makes access decisions based on policies, identity, device state, and context Could be a policy engine like OPA or Cedar (from Episode 24)
Policy Administrator (PA) Translates the PE's decisions into action — issues session tokens, configures access paths Often part of your identity layer or API gateway
Policy Enforcement Point (PEP) Applies decisions at the resource boundary — allows or blocks the actual request API middleware, network gateway, or service mesh proxy

The flow for every access request:

  1. User/device sends a request to the PEP
  2. PEP forwards identity and context to the PE
  3. PE evaluates policies using attributes (identity, device, location, time, risk score)
  4. PE returns allow/deny to the PA
  5. PA instructs the PEP to permit or block the request
  6. If permitted, the session is established with minimum required privileges
Key insight: This happens on every request, not just at login. A traditional system authenticates once and grants a session. Zero Trust re-evaluates continuously — the user's device compliance could change, their risk score could escalate, or an anomaly could be detected mid-session.2

Identity-Based Access

In Zero Trust, identity is the new perimeter. Every request carries proof of identity and authorisation — not just a session cookie created at login, but continuously verified credentials. This connects directly to the authentication and authorisation stack we've built across Episodes 17-25:

For legal SaaS, this means the JWT token or session (from Episode 18) should carry not just identity but context — device compliance status, network location, authentication strength — and the authorisation layer should evaluate all of it on every API call.3

Microsegmentation

Microsegmentation divides your infrastructure into fine-grained zones, each with its own access controls. In a traditional network, once you're past the firewall, you can reach everything. With microsegmentation, each service, database, and API has its own boundary.4

For a legal SaaS platform:

Segment Contains Access Rules
Document service Document storage, version control Only the API gateway and authorised microservices can reach it
Billing service Financial data, invoicing Only billing API endpoints, restricted to admin and partner roles
Search service Full-text index, matter metadata Only the search API, filtered by ethical walls (Episode 25)
Database PostgreSQL/MySQL instance Only application services on specific ports — never directly accessible from the internet
User service Authentication, session management Only the API gateway and identity provider

The CISA Zero Trust Maturity Model explicitly identifies microsegmentation as a foundational control: "not a nice-to-have or an advanced-stage optimization" but essential infrastructure.5

If an attacker compromises the document service, microsegmentation prevents them from pivoting to the billing database or the user authentication service. Each hop requires a separate authorised connection. This is the practical meaning of "assume breach" — you design each segment to survive even if adjacent segments are compromised.

The CISA Zero Trust Maturity Model

The CISA Zero Trust Maturity Model provides a roadmap with four maturity stages across five pillars:5

Pillar Traditional Initial Advanced Optimal
Identity Password-only, static groups MFA, basic SSO Phishing-resistant MFA, continuous validation Identity-driven, risk-adaptive access
Devices No inventory Basic inventory Device compliance checked at access time Real-time device health integrated into every decision
Networks Flat network, perimeter firewall Basic segmentation Microsegmentation, encrypted east-west traffic Fully encrypted, software-defined perimeters
Applications Monolithic, trusted internally Some API gateway controls Per-service authorisation Every service independently verified
Data Unclassified, broadly accessible Basic classification Encryption + access controls by classification Automated classification, real-time protection

Most legal SaaS platforms should target "Advanced" across all pillars. "Optimal" is aspirational for most organisations but increasingly expected for platforms handling national security or government legal work.

Practical Zero Trust for a Small Team

Zero Trust sounds like a massive infrastructure project. For a small legal SaaS team, here's a prioritised implementation path:6

Phase 1: Identity Foundation (Weeks 1-4)

Phase 2: API-Level Enforcement (Weeks 5-8)

Phase 3: Network Segmentation (Weeks 9-12)

Phase 4: Continuous Verification (Ongoing)

The 80/20 rule: Phases 1 and 2 deliver most of the security benefit. If you do nothing else, enforce MFA, implement SSO, and check authorisation on every API request. That alone moves you from a perimeter-based model to an identity-based one.6

Google BeyondCorp: The Original Implementation

Google's BeyondCorp initiative, published in a series of papers from 2014 onwards, was the first large-scale production implementation of Zero Trust.7 Google eliminated the corporate VPN entirely — internal applications are accessed the same way from the office as from a coffee shop. Every request is authenticated, every device is verified, and access decisions are made per-request based on identity and device state.

BeyondCorp proved that Zero Trust is not just theoretical. It works at the scale of one of the world's largest technology companies. For legal SaaS platforms, the lesson is clear: if Google can eliminate implicit trust for 100,000+ employees, a 50-person SaaS company can certainly adopt the same principles.

What's Next

Episode 27 covers Multi-Tenant Data Isolation — how your SaaS platform keeps 50 different law firms' data completely separate, and what happens when the isolation fails.

Sources & Further Reading

Sources & references

  1. NIST, SP 800-207: Zero Trust Architecture — the foundational zero trust standard.
  2. NIST, SP 800-207A: Zero Trust Architecture Model for Access Control in Cloud-Native Applications — cloud-native ZTA guidance.
  3. Palo Alto Networks, What is NIST SP 800-207? — overview of the NIST ZTA framework.
  4. CISA, Microsegmentation in Zero Trust — CISA guidance on microsegmentation as a foundational ZTA control.
  5. CISA, Zero Trust Maturity Model — five-pillar maturity framework.
  6. TerraZone, NIST SP 800-207: Complete Guide to Zero Trust Architecture (2025) — practical implementation guide.
  7. Google Cloud, BeyondCorp — Google's zero trust implementation.
  8. CyberArk, What is NIST SP 800-207? — ZTA framework overview.
  9. Zero Networks, CISA Guidance Confirms: Microsegmentation Is Foundational for Zero Trust — analysis of CISA microsegmentation guidance.
  10. Seraphic Security, Top 4 Zero Trust Frameworks in 2026 — framework comparison and selection guide.