๐Interactive Checklist
Zero Trust Implementation Checklist
Track progress across identity, devices, networks, applications, and data pillars.
30 items0%
Critical items (marked โ ) carry 4โ5ร weight. A Zero Trust programme is only as strong as its weakest pillar โ aim for balanced progress across all five.
Pillar 1: Identity
Identity is the new perimeter. Verify every user, every time.
0/6
Multi-factor authentication (MFA) is enforced for all users, including privileged accounts.
โ
Critical
A centralised identity provider (IdP) is in place for all applications.
โ
Critical
Privileged Access Management (PAM) controls are implemented for admin accounts.
โ
Critical
Just-in-time (JIT) and just-enough-access (JEA) principles are applied.
Identity lifecycle management (joiner, mover, leaver) is automated.
Continuous authentication and risk-based access policies are configured.
Pillar 2: Devices
Only known, compliant devices should access corporate resources.
0/6
All corporate devices are enrolled in a Mobile Device Management (MDM) or UEM solution.
โ
Critical
Device compliance policies are enforced as a condition of access.
โ
Critical
Endpoint Detection and Response (EDR) is deployed on all managed endpoints.
Patch management ensures devices are updated within defined SLAs.
BYOD devices accessing corporate data are subject to MAM or containerisation policies.
Device health signals are integrated with conditional access policies.
Pillar 3: Networks
Assume breach. Segment and monitor all network traffic.
0/6
Micro-segmentation is implemented to limit lateral movement within the network.
โ
Critical
Traditional VPN is being replaced or augmented with Zero Trust Network Access (ZTNA).
East-west traffic (internal) is inspected, not just north-south (perimeter).
โ
Critical
DNS filtering and web proxy controls are in place for all users.
Network access control (NAC) prevents unauthorised devices from connecting.
Software-defined perimeter (SDP) or SASE architecture is evaluated or in progress.
Pillar 4: Applications
Protect applications regardless of where they are hosted.
0/6
All applications require authentication โ no anonymous or implicit trust.
โ
Critical
Application access is granted based on identity, device, and context โ not network location.
โ
Critical
Shadow IT applications have been discovered and brought under governance.
API security controls (authentication, rate limiting, threat protection) are in place.
Application security testing (SAST/DAST) is integrated into the CI/CD pipeline.
SaaS applications are governed through a Cloud Access Security Broker (CASB).
Pillar 5: Data
Protect data wherever it lives โ at rest, in transit, and in use.
0/6
Data classification policy is defined and applied to critical data assets.
โ
Critical
Data Loss Prevention (DLP) controls are in place for sensitive data categories.
โ
Critical
Encryption is enforced for data at rest and in transit across all environments.
Data access is governed by least-privilege principles and reviewed regularly.
Data residency and sovereignty requirements are documented and enforced.
A data discovery tool is used to locate and classify unstructured data.