Home About Projects Blog Subscribe Login

The Zero Trust Migration Nobody Talks About

Every CISO wants Zero Trust. Almost none can afford the migration cost. The gap between vision and reality is brutal. Here's the pragmatic path.

Zero Trust is the security model everyone wants and almost nobody has. The concept is elegant: never trust, always verify. No implicit trust based on network location. Every access request authenticated, authorized, and encrypted.

In theory, it's beautiful. In practice, it's a migration nightmare.

The Promise vs. The Reality

The pitch deck version of Zero Trust looks something like this: deploy a few agents, flip some policy switches, and suddenly your entire infrastructure is magically secure. Perimeter security is dead, long live identity-based access.

The reality? You're running a 15-year-old ERP system that wasn't designed for modern auth. Your OT network can't handle TLS overhead. Your DevOps team has 47 service accounts with hardcoded credentials. Your VPN has 3,000 active users who will riot if you break their workflow.

And your board wants Zero Trust implemented by Q3.

Why Most Migrations Fail

I've watched dozens of Zero Trust projects stall or collapse. The pattern is always the same:

The gap between "Zero Trust architecture" and "Zero Trust reality" is measured in years and millions of dollars.

The Pragmatic Path

Here's what actually works, learned from migrating Link11's infrastructure and consulting with dozens of enterprises:

1. Start with Crown Jewels

Don't migrate everything. Start with your highest-risk, highest-value assets. Customer database? Yes. The wiki nobody reads? Later. Maybe never.

This gives you quick wins, proves the model works, and builds organizational momentum. You'll learn what breaks before you break everything.

2. Identity Before Network

Get your identity infrastructure solid before you touch network architecture. Modern SSO, strong MFA, proper lifecycle management. If your identity foundation is shaky, everything built on top will be worse.

This also buys you time. You can roll out better auth while your network stays mostly unchanged. Users get used to the new flow before you rip out their VPN.

3. Proxy First, Replace Later

That legacy app that can't do modern auth? Put an identity-aware proxy in front of it. Yes, it's a band-aid. But it's a band-aid that works today instead of a rewrite that might work in 18 months.

We ran these proxies for years. They're still running for a few stubborn systems. Perfect is the enemy of secure-enough.

4. Segment Progressively

You don't need micro-segmentation on day one. Start with broad zones: production, staging, corporate, OT. Get comfortable with policy enforcement at that level.

Then subdivide. Production becomes prod-web, prod-api, prod-data. Each split is a learning opportunity. Rush it and you'll spend more time troubleshooting than improving security.

5. Automate or Die

Manual policy management doesn't scale. Period. If your Zero Trust implementation requires humans to review and approve every new service, you've built a bureaucracy, not a security model.

Invest in infrastructure-as-code, policy-as-code, and automated provisioning from day one. The upfront cost is high. The alternative is organizational paralysis.

The Uncomfortable Truth

Zero Trust is not a project. It's a decade-long transformation.

Anyone selling you a "12-month Zero Trust migration" is either lying or doesn't understand your environment. The companies that succeed treat it like a journey: start walking, keep walking, measure progress, adjust as you go.

The companies that fail treat it like a destination: plan the perfect route, wait for ideal conditions, never actually leave.

What Good Looks Like

After three years of incremental migration, here's what we achieved at Link11:

It wasn't perfect. We still have legacy exceptions. Some systems will probably never migrate. But we went from castle-and-moat to identity-centric without a single major outage or user rebellion.

Start Today, Not Next Quarter

The best time to start your Zero Trust migration was five years ago. The second best time is today.

Pick one high-value system. Put proper identity controls around it. Learn what breaks. Fix it. Repeat.

In 12 months you'll have a handful of properly secured systems and a team that knows how to migrate the rest. In 24 months you'll be ahead of 90% of your industry.

The gap between vision and reality is brutal—but it's crossable. You just can't cross it in a single sprint.

The companies that win aren't the ones with perfect Zero Trust architectures. They're the ones that started walking while everyone else was still planning the route.


Follow the journey

Subscribe to Lynk for daily insights on AI strategy, cybersecurity, and building in the age of AI.

Subscribe →