Today’s Lesson
Security for Legal SaaS — Episode 26: Zero Trust Architecture
The Death of the Network Perimeter
For decades, network security operated on a simple assumption: everything inside the corporate network is trusted, everything outside is not. The firewall was the castle wall. If you were inside — physically in the office or connected to the VPN — you could access internal resources freely.
That model is dead. Remote work, cloud services, and SaaS applications mean that the "inside" and "outside" distinction no longer exists. A partner working from a hotel in Singapore accesses the same case management system as an associate in the New York office. A legal SaaS platform runs on AWS, not in a server room. The data flows across the public internet. The perimeter is everywhere — which means it's nowhere.
Zero Trust is the security model built for this reality. It was first articulated by John Kindervag at Forrester Research in 2010, formalised by NIST in SP 800-207 (2020), and adopted as US federal policy under Executive Order 14028.1
The Three Principles
Zero Trust rests on three principles:
| Principle | What It Means | Legal SaaS Example |
|---|---|---|
| Never trust, always verify | No entity is trusted by default — not users, not devices, not networks | A lawyer on the office VPN still authenticates and authorises for every request |
| Assume breach | Design systems as if an attacker is already inside your network | If the database server is compromised, lateral movement to the document store is still blocked |
| Least-privilege access | Every entity gets the minimum permissions needed, for the minimum time needed | An associate gets read access to their assigned matters — not all matters, not forever |
These principles extend the defence-in-depth concept we covered in Episode 4. Defence in depth layers multiple security controls. Zero Trust makes each layer verify independently — no layer assumes a previous layer already checked.
NIST SP 800-207: The Architecture
NIST SP 800-207 defines three core components of a Zero Trust Architecture:1
| Component | Role | Implementation |
|---|---|---|
| Policy Engine (PE) | Makes access decisions based on policies, identity, device state, and context | Could be a policy engine like OPA or Cedar (from Episode 24) |
| Policy Administrator (PA) | Translates the PE's decisions into action — issues session tokens, configures access paths | Often part of your identity layer or API gateway |
| Policy Enforcement Point (PEP) | Applies decisions at the resource boundary — allows or blocks the actual request | API middleware, network gateway, or service mesh proxy |
The flow for every access request:
- User/device sends a request to the PEP
- PEP forwards identity and context to the PE
- PE evaluates policies using attributes (identity, device, location, time, risk score)
- PE returns allow/deny to the PA
- PA instructs the PEP to permit or block the request
- If permitted, the session is established with minimum required privileges
Key insight: This happens on every request, not just at login. A traditional system authenticates once and grants a session. Zero Trust re-evaluates continuously — the user's device compliance could change, their risk score could escalate, or an anomaly could be detected mid-session.2
Identity-Based Access
In Zero Trust, identity is the new perimeter. Every request carries proof of identity and authorisation — not just a session cookie created at login, but continuously verified credentials. This connects directly to the authentication and authorisation stack we've built across Episodes 17-25:
- Authentication (Episodes 17-22): Passwords, MFA, SSO, SAML — proving who the user is
- Authorisation (Episodes 23-25): RBAC, ABAC, ethical walls — deciding what they can do
- Continuous verification: Re-evaluating both on every request, not just at session start
For legal SaaS, this means the JWT token or session (from Episode 18) should carry not just identity but context — device compliance status, network location, authentication strength — and the authorisation layer should evaluate all of it on every API call.3
Microsegmentation
Microsegmentation divides your infrastructure into fine-grained zones, each with its own access controls. In a traditional network, once you're past the firewall, you can reach everything. With microsegmentation, each service, database, and API has its own boundary.4
For a legal SaaS platform:
| Segment | Contains | Access Rules |
|---|---|---|
| Document service | Document storage, version control | Only the API gateway and authorised microservices can reach it |
| Billing service | Financial data, invoicing | Only billing API endpoints, restricted to admin and partner roles |
| Search service | Full-text index, matter metadata | Only the search API, filtered by ethical walls (Episode 25) |
| Database | PostgreSQL/MySQL instance | Only application services on specific ports — never directly accessible from the internet |
| User service | Authentication, session management | Only the API gateway and identity provider |
The CISA Zero Trust Maturity Model explicitly identifies microsegmentation as a foundational control: "not a nice-to-have or an advanced-stage optimization" but essential infrastructure.5
If an attacker compromises the document service, microsegmentation prevents them from pivoting to the billing database or the user authentication service. Each hop requires a separate authorised connection. This is the practical meaning of "assume breach" — you design each segment to survive even if adjacent segments are compromised.
The CISA Zero Trust Maturity Model
The CISA Zero Trust Maturity Model provides a roadmap with four maturity stages across five pillars:5
| Pillar | Traditional | Initial | Advanced | Optimal |
|---|---|---|---|---|
| Identity | Password-only, static groups | MFA, basic SSO | Phishing-resistant MFA, continuous validation | Identity-driven, risk-adaptive access |
| Devices | No inventory | Basic inventory | Device compliance checked at access time | Real-time device health integrated into every decision |
| Networks | Flat network, perimeter firewall | Basic segmentation | Microsegmentation, encrypted east-west traffic | Fully encrypted, software-defined perimeters |
| Applications | Monolithic, trusted internally | Some API gateway controls | Per-service authorisation | Every service independently verified |
| Data | Unclassified, broadly accessible | Basic classification | Encryption + access controls by classification | Automated classification, real-time protection |
Most legal SaaS platforms should target "Advanced" across all pillars. "Optimal" is aspirational for most organisations but increasingly expected for platforms handling national security or government legal work.
Practical Zero Trust for a Small Team
Zero Trust sounds like a massive infrastructure project. For a small legal SaaS team, here's a prioritised implementation path:6
Phase 1: Identity Foundation (Weeks 1-4)
- Enforce MFA for all users (Episode 21)
- Implement SSO with SAML/OIDC (Episode 22)
- Short-lived sessions with automatic token refresh (Episode 19)
Phase 2: API-Level Enforcement (Weeks 5-8)
- Every API endpoint checks authorisation — no implicit trust (Episode 23)
- Deploy a policy engine for ABAC decisions (Episode 24)
- Log all access decisions with immutable audit trails
Phase 3: Network Segmentation (Weeks 9-12)
- Database never directly accessible from the internet
- Service-to-service authentication (mTLS, from Episode 15)
- Separate network segments for different service tiers
Phase 4: Continuous Verification (Ongoing)
- Device compliance checking at access time
- Anomaly detection — unusual access patterns trigger step-up authentication (Episode 19)
- Risk-adaptive policies that tighten access when risk indicators increase
The 80/20 rule: Phases 1 and 2 deliver most of the security benefit. If you do nothing else, enforce MFA, implement SSO, and check authorisation on every API request. That alone moves you from a perimeter-based model to an identity-based one.6
Google BeyondCorp: The Original Implementation
Google's BeyondCorp initiative, published in a series of papers from 2014 onwards, was the first large-scale production implementation of Zero Trust.7 Google eliminated the corporate VPN entirely — internal applications are accessed the same way from the office as from a coffee shop. Every request is authenticated, every device is verified, and access decisions are made per-request based on identity and device state.
BeyondCorp proved that Zero Trust is not just theoretical. It works at the scale of one of the world's largest technology companies. For legal SaaS platforms, the lesson is clear: if Google can eliminate implicit trust for 100,000+ employees, a 50-person SaaS company can certainly adopt the same principles.
What's Next
Episode 27 covers Multi-Tenant Data Isolation — how your SaaS platform keeps 50 different law firms' data completely separate, and what happens when the isolation fails.
Sources & Further Reading
Sources & references
- NIST, SP 800-207: Zero Trust Architecture — the foundational zero trust standard.
- NIST, SP 800-207A: Zero Trust Architecture Model for Access Control in Cloud-Native Applications — cloud-native ZTA guidance.
- Palo Alto Networks, What is NIST SP 800-207? — overview of the NIST ZTA framework.
- CISA, Microsegmentation in Zero Trust — CISA guidance on microsegmentation as a foundational ZTA control.
- CISA, Zero Trust Maturity Model — five-pillar maturity framework.
- TerraZone, NIST SP 800-207: Complete Guide to Zero Trust Architecture (2025) — practical implementation guide.
- Google Cloud, BeyondCorp — Google's zero trust implementation.
- CyberArk, What is NIST SP 800-207? — ZTA framework overview.
- Zero Networks, CISA Guidance Confirms: Microsegmentation Is Foundational for Zero Trust — analysis of CISA microsegmentation guidance.
- Seraphic Security, Top 4 Zero Trust Frameworks in 2026 — framework comparison and selection guide.