Zero Trust Networking for Australian SMBs: What It Is and How to Apply It

Managed IT & Cybersecurity

Zero Trust Networking for Australian SMBs: What It Is and How to Apply It

If you have been in any IT conversation in the last few years, you have almost certainly heard the phrase "zero trust." It is one of those terms that gets thrown around freely — in vendor marketing, government guidance, and cybersecurity frameworks — to the point where it can feel like another piece of industry jargon designed to make simple concepts sound complicated.

The reality is that zero trust describes a genuinely important shift in how networks are designed and secured. It is not a product you can buy, a feature you can switch on, or something reserved for large enterprises with dedicated security teams. It is a security philosophy — a different way of thinking about who and what should be trusted on your network — and many of the practical tools that implement it are already available to Australian SMBs through their existing Microsoft 365 subscriptions.

This article explains what zero trust actually means, why the traditional approach to network security is no longer adequate, and how to start applying zero trust principles in a small or medium-sized business environment. It is written for business owners and IT managers who have heard the term and want a straight answer about whether it is relevant to them.


What Is Zero Trust?

Zero trust is a security model built on a single principle: never trust, always verify.

In a traditional network model, the network perimeter — typically the firewall at the edge of your office — is the primary security boundary. Devices and users inside that perimeter are treated as trusted by default. If you are connected to the office network, either physically or through a VPN, you are assumed to be legitimate and granted access to internal resources.

Zero trust removes that implicit trust entirely. Every access request — regardless of whether it originates from inside the office, from a remote worker at home, or from a cloud application — must be verified before access is granted. Verification is based on a combination of signals: who is the user, have they authenticated, what device are they using, is that device healthy, where are they connecting from, what resource are they trying to access, and is that access consistent with their normal behaviour?

The model was formalised by the US National Institute of Standards and Technology (NIST) in Special Publication 800-207, published in 2020. It has since been adopted as a foundational framework by major cloud providers including Microsoft and Google, and by government cybersecurity agencies in the United States, United Kingdom, and Australia. The Australian Cyber Security Centre (ACSC) references zero trust principles in its network security guidance, and the principles align closely with several controls in the Essential Eight framework that the ACSC recommends for Australian organisations.

Zero trust is not a product. No single vendor sells "zero trust in a box." It is an architectural approach implemented through a combination of identity management, device management, network segmentation, and continuous monitoring — all working together toward the goal of removing implicit trust from your environment.


Why Traditional Perimeter Security No Longer Works

The traditional network security model was built around a clear boundary: internal is trusted, external is not. A firewall separates the two. Users inside the office connect to internal resources freely; traffic from outside is scrutinised or blocked. This model worked reasonably well when most business applications lived on servers inside the office, most employees worked from a fixed location, and threats primarily came from outside the perimeter.

Three fundamental shifts have broken that model for most businesses.

Cloud applications have moved data outside the perimeter. The majority of the tools that Australian SMBs rely on today — Microsoft 365, Xero, MYOB, Salesforce, Slack, Google Workspace — live entirely outside the corporate network. They are hosted in cloud data centres and accessed over the internet. A perimeter firewall does not protect data in Microsoft SharePoint or emails in Exchange Online. Your firewall never even sees that traffic in most configurations. The data that matters most to your business may now live entirely outside the boundary your traditional security was designed to protect.

Remote work has eliminated the "inside the office" assumption. Staff access corporate systems from home networks, hotel WiFi, client sites, and cafes. In a traditional perimeter model, once a user is on a VPN and "inside" the network, they are trusted. But VPN credentials are stolen, home networks are insecure, and the device connecting to your systems may not meet the same security standard as an office workstation. The perimeter model assumes a physical location that no longer reliably corresponds to security posture.

Attackers routinely breach the perimeter and then move laterally. When a threat actor gains initial access — through a phishing email, a compromised credential, an unpatched remote desktop service, or an exploited VPN vulnerability — the traditional perimeter model offers very little resistance to what happens next. Once inside, an attacker can move freely across internal systems because internal traffic is implicitly trusted. The 2024 incident data reported to the OAIC and tracked by the ACSC confirms that the most damaging breaches in Australia involve lateral movement after initial access. The attacker gets in through one compromised account or device, and then pivots to reach sensitive data, financial systems, or backup infrastructure.

The perimeter model was designed for a world that no longer exists. Zero trust replaces the perimeter as the primary security boundary with something more durable: verified identity and device health, applied to every access request, regardless of where it originates.


The Three Core Principles of Zero Trust

NIST SP 800-207 and subsequent frameworks organise zero trust around three core principles. Understanding these principles helps clarify what zero trust actually requires in practice.

Verify Explicitly

Every access request must be authenticated and authorised using all available data points — not just a username and password. Verification should consider the user's identity, whether they have completed multi-factor authentication, the health and compliance status of the device they are using, their location, the time of the access request, the sensitivity of the resource being requested, and whether the access pattern is consistent with that user's normal behaviour.

Multi-factor authentication is the baseline requirement for explicit verification. Without MFA, a stolen password is all an attacker needs to pass identity verification. MFA makes a compromised credential significantly less useful on its own.

Conditional access policies are the implementation mechanism — rules that evaluate the available signals and determine whether to grant access, require additional verification, or block the request entirely. In a Microsoft 365 environment, this is delivered through Microsoft Entra ID Conditional Access, which can enforce policies such as "allow access to finance applications only from compliant devices" or "require MFA when accessing SharePoint from an unrecognised location."

Use Least Privilege Access

Users, devices, and applications should only have access to the specific resources required for their current function — nothing more. A staff member in accounts payable does not need access to HR records. A marketing contractor does not need access to financial systems. A salesperson's laptop does not need to communicate with the server hosting your backup software.

This principle extends to administrative access. Admin rights are among the most dangerous permissions in any environment because they can be used to modify security controls, create new accounts, access any system, and cover tracks. In a least privilege model, no one holds standing administrative access as a matter of routine. Administrators request elevated access only when they need it, for the specific task at hand, and that elevated access is revoked when the task is complete. This is the principle behind Privileged Identity Management (PIM) in Microsoft Entra ID.

Least privilege requires regular access reviews. Users change roles, contractors finish engagements, and employees leave. Without a process for reviewing and adjusting access rights, permissions accumulate over time and create unnecessary risk.

Assume Breach

The assume breach principle acknowledges that no security control is perfect and that a determined attacker will eventually find a way in. Rather than designing your security entirely around preventing initial access, you also design it to limit what an attacker can do after gaining access.

The practical implication is network segmentation. If every device on your network can communicate freely with every other device, a compromised laptop or IoT device can reach your server, your backup system, your finance application, and your HR records. Segmentation creates boundaries inside the network so that a compromise in one area cannot spread freely to everything else. The goal is to reduce the blast radius of a breach.

Assume breach also means monitoring continuously — logging access events, watching for unusual patterns (a user account suddenly accessing systems it has never touched, large volumes of data being downloaded outside business hours), and having processes in place to detect and respond to anomalies. Detection and response capability is covered in endpoint detection and response tooling, which feeds signals back into your zero trust controls.


Zero Trust vs VPN — What Is the Difference?

This is one of the most common points of confusion, and it is worth addressing directly because many Australian businesses have invested in VPN infrastructure for remote access.

A VPN (virtual private network) grants network-level access. When a user connects to a VPN, they are effectively placed inside the network. Their device can reach any resource on that network that is not specifically blocked by a rule. VPNs were designed for a world where all your applications and data lived on internal servers, and remote workers needed to be "in the office" to access them.

The problem with VPN in a zero trust context is that access scope is too broad. A stolen VPN credential — which is frequently obtained through phishing or credential stuffing attacks — grants the attacker network-level access to everything the VPN permits. The attacker is, from the network's perspective, inside. The traditional model has no way to distinguish a legitimate remote worker from an attacker using that worker's credentials.

Zero trust network access (ZTNA) works differently. Rather than granting network-level access, ZTNA grants access to specific applications. A user authenticates with their identity and satisfies the device health check, and they are granted access to the particular application they have been authorised for — email, a CRM, an accounting system — not to the underlying network. If their credential is stolen, the attacker can access only the applications that user was authorised for, and only if the device they are using passes the health check.

VPNZTNA
Access scopeFull network accessApplication-level access only
Trust modelNetwork location determines trustIdentity and device health determine trust
Device requirementsTypically none enforcedDevice compliance required
Cloud compatibilityPoor — designed for internal resourcesNative — works with cloud and on-prem apps
Lateral movement riskHigh — attacker reaches the whole networkLow — attacker reaches specific apps only
Implementation complexityLow for basic setupModerate — requires identity and device management

For most Australian SMBs, this does not mean immediately replacing your VPN. It means understanding the limitation of VPN access and working toward application-level access controls as you mature your zero trust posture.


Zero Trust for Microsoft 365 — Where Most Australian SMBs Start

If your business runs Microsoft 365, you already have access to the core building blocks of a zero trust architecture. Microsoft has invested heavily in embedding zero trust capability into the M365 platform, and many of the relevant tools are included in Microsoft 365 Business Premium or available at relatively low additional cost.

Microsoft Entra ID (formerly Azure Active Directory) Conditional Access is the centrepiece of zero trust identity controls in a Microsoft environment. Conditional Access policies evaluate every sign-in request against a set of conditions — who is the user, what application are they accessing, what device are they using, where are they connecting from, what risk level has been assessed — and determine whether to grant access, require additional verification, or block the request. Conditional Access requires at minimum Microsoft 365 Business Premium or Entra ID P1 licensing. Without it, you cannot enforce device compliance or risk-based access decisions at scale.

Microsoft Intune provides device management and compliance enforcement. Once devices are enrolled in Intune, you can define compliance policies — the device must have an up-to-date operating system, antivirus must be active, BitLocker encryption must be enabled, a screen lock must be configured — and Conditional Access can require that a device pass compliance before being granted access to business applications. A personal device that is not enrolled and not compliant can be blocked entirely or limited to read-only browser access.

Microsoft Defender for Business is the endpoint detection and response (EDR) component available to SMBs through Microsoft 365 Business Premium. As well as detecting threats on endpoints, Defender for Business feeds risk signals into Entra ID. If a device is assessed as compromised or high-risk, Conditional Access can automatically restrict its access until the issue is remediated. This closes the loop between detection and access control — a core feature of a mature zero trust architecture.

Privileged Identity Management (PIM) implements just-in-time admin access for Microsoft 365 and Azure environments. Rather than leaving admin accounts with permanent elevated permissions, PIM requires administrators to request activation of a privileged role, specify a reason, and accept a time-limited grant. This means that even if an admin account is compromised, the attacker does not inherit standing admin access — they would need to trigger the activation workflow, which generates an alert and requires approval.


Network Segmentation and Microsegmentation

Zero trust at the identity layer is a significant step forward, but it addresses only part of the problem. The assume breach principle also requires thinking about what happens on the network after initial access is obtained — specifically, whether a compromised device can freely reach everything else on the network.

Network segmentation is the practice of dividing a network into separate logical zones with controlled traffic between them. In an unsegmented network, a compromised laptop can communicate with servers, IP cameras, building management systems, IoT devices, printers, and any other device on the same network. Segmentation puts boundaries between those zones so that a compromised device in one area cannot freely reach devices in another.

The most accessible segmentation technology for SMBs is VLANs (virtual local area networks). VLANs allow you to divide a physical network infrastructure into multiple logical networks. A practical segmentation for an SMB might include separate VLANs for staff devices, servers, IP cameras and CCTV, building IoT devices (access control, environmental sensors), and guest WiFi. Each segment operates independently, and traffic between segments is controlled by firewall rules.

Firewall rules for east-west traffic — traffic moving laterally inside the network between segments — are as important as rules for north-south traffic (traffic entering and leaving the network). In a traditional model, internal traffic is trusted and east-west traffic flows freely. In a zero trust network design, firewall rules between segments enforce the principle of least privilege at the network level. A staff device in the user VLAN has no business initiating connections to the CCTV network. A guest WiFi user has no business reaching internal file servers. Rules that block these paths by default and permit only what is explicitly required significantly reduce what an attacker can do with a compromised device.

Microsegmentation takes this further, applying controls at the workload or application level rather than the network segment level. Where VLANs group many devices into a segment, microsegmentation can control traffic at the individual server or application level — limiting which services can communicate with which other services even within the same network segment. Microsegmentation is most relevant for businesses with server infrastructure or complex application environments, and it is typically implemented through host-based firewalls or software-defined networking tools.

For most Australian SMBs, basic VLAN segmentation and east-west firewall rules between major device categories delivers the majority of the benefit. Even a simple four-VLAN design — staff, servers, IoT, and guests — significantly reduces the blast radius of a compromise compared with a flat, unsegmented network.


Identity Is the New Perimeter

One of the central statements in zero trust thinking is that identity has replaced network location as the primary trust signal. This reflects the reality of modern environments: a user connecting from inside the office is not automatically more trustworthy than a user connecting from home, because the attacker who has stolen that user's password can also be inside the office, on the VPN, or in any other location.

What matters is not where the connection originates. What matters is who is connecting, whether they have proven their identity with strong authentication, whether the device they are using meets your security requirements, and whether the access they are requesting is consistent with their role and normal behaviour.

Building a strong identity foundation requires several components working together.

Centralised identity management — using Entra ID or Active Directory as the authoritative source for all user accounts — means that every access attempt is managed, logged, and auditable in one place. When a user leaves the organisation or changes roles, their access can be adjusted or revoked from a single point rather than tracking down permissions across multiple systems.

Multi-factor authentication on every account is the non-negotiable baseline. No zero trust architecture means anything if accounts can be compromised with just a password.

Privileged access management for administrator accounts ensures that the most powerful accounts in your environment do not carry standing elevated privileges that represent an outsized risk if compromised. Admin access should be time-limited, logged, and subject to approval workflows.

Service accounts and application accounts are frequently overlooked in SMB environments. These are accounts used by software applications, automated processes, and integrations — not by human users. They often carry significant permissions, and they are frequently configured with passwords that never expire and no MFA, because the assumption is that no human will log in with them. In a zero trust model, service accounts should follow the same least privilege principles as user accounts, with regular review and tight scope controls.

Access reviews are an ongoing operational requirement, not a one-time exercise. Users who change roles accumulate permissions from their previous positions. Contractors who finish engagements may retain access if off-boarding processes are not followed. A regular review cycle — at minimum quarterly for privileged access, annually for general access — catches these accumulations before they create unnecessary risk.


Practical Zero Trust Implementation for Australian SMBs — A Phased Approach

Zero trust is a direction of travel, not a destination. No business — regardless of size — fully implements every aspect of zero trust from day one. The goal is to make consistent progress across the core pillars, building on each phase before moving to the next.

A realistic phased approach for an Australian SMB looks like this.

Phase 1 — Identity foundation. Enforce MFA on all user accounts without exception. Centralise identity management in Entra ID. Deploy Conditional Access policies at a baseline level — at minimum, requiring MFA for all sign-ins and blocking access from known high-risk locations. This phase is achievable quickly and delivers the greatest immediate risk reduction, because compromised credentials are the most common initial access vector in Australian breach data.

Phase 2 — Device health. Enrol all business devices in Microsoft Intune. Define compliance policies that reflect your minimum security requirements — OS patching level, antivirus status, encryption, screen lock. Update Conditional Access policies to require device compliance as a condition of access to sensitive applications. Deploy endpoint detection and response tooling (Microsoft Defender for Business covers this for Microsoft 365 Business Premium subscribers) and connect its risk signals to Conditional Access.

Phase 3 — Network segmentation. Design and implement VLAN segmentation for major device categories. Establish firewall rules that restrict east-west traffic between segments to only what is explicitly required. Separate staff devices, servers, IoT and building systems, and guest WiFi onto distinct VLANs. Review and harden wireless access controls.

Phase 4 — Application access. For applications that are genuinely sensitive — financial systems, HR platforms, development environments — evaluate whether VPN-based remote access should be replaced with application-level zero trust access controls. For Microsoft 365 workloads, Conditional Access and Intune compliance requirements already implement this model. For non-Microsoft applications, evaluate ZTNA solutions that can extend the same principles to any application.

Phase 5 — Continuous monitoring. Aggregate access logs and security events into a central monitoring platform. Establish alerting for anomalous behaviours — sign-ins from unusual locations, access to systems outside a user's normal pattern, large data transfers during off-hours. Review access rights on a regular cycle. Test your detection and response capability through periodic exercises.

Each phase builds on the previous one, and each delivers meaningful risk reduction in its own right. The Essential Eight controls overlap significantly with Phases 1 and 2 — implementing MFA, patching applications and operating systems, restricting administrative privileges, and controlling application execution are all steps on the same journey. The ACSC's maturity model for the Essential Eight and the zero trust phased approach complement each other well.

Do not let the full scope of zero trust become a reason not to start. An SMB that completes Phase 1 and Phase 2 — strong identity controls and device health enforcement — is in a substantially better security position than one that is waiting for the budget and resources to do everything at once.


How Pickle Implements Zero Trust Principles for Australian SMBs

Zero trust is not a theoretical exercise for Pickle's clients. The managed IT services Pickle provides to Australian SMBs, strata buildings, and commercial properties are built around the practical building blocks of zero trust architecture.

For businesses on Microsoft 365, Pickle manages the deployment and configuration of Microsoft 365 Business Premium, including Conditional Access policies, Microsoft Intune device enrolment and compliance enforcement, and Microsoft Defender for Business. For clients where these tools are not yet in place, Pickle conducts an assessment, builds a deployment plan, and handles implementation — including the often-overlooked work of migrating existing devices into Intune management and tuning Conditional Access policies so they are secure without disrupting legitimate business workflows.

At the network layer, Pickle designs and implements segmented network architectures for office and building environments — including VLAN design, managed switch configuration, wireless network segmentation, and firewall rule reviews. For strata and commercial buildings where IoT and building management systems share network infrastructure with business systems, proper segmentation is particularly critical.

MFA rollout — including managing the transition for staff who are unfamiliar with authenticator apps and supporting organisations through the cultural change that comes with new security requirements — is a standard component of Pickle's security engagements.

If you are an Australian business owner or IT manager who wants to understand where your organisation stands against zero trust principles and what a realistic implementation path looks like for your environment, Pickle can help. Call 1300 688 588 or email [email protected] to start the conversation.


Frequently Asked Questions

Q: Does zero trust mean I don't need a firewall anymore?

A: No. Firewalls remain an important part of a zero trust architecture — they are just not the only layer of defence, and they are not the primary trust boundary. In a zero trust model, firewalls control traffic between network segments (east-west) and between your network and the internet (north-south). What changes is that internal traffic is no longer trusted by default simply because it comes from inside the perimeter. Firewalls are one tool among many in a layered security architecture.

Q: Is zero trust only for large enterprises?

A: No, and this is one of the most important misconceptions to dispel. The tools required to implement the core pillars of zero trust — MFA, Conditional Access, device compliance enforcement, and network segmentation — are available to businesses of any size. Microsoft 365 Business Premium, which many Australian SMBs already use, includes the primary identity and device management tools needed to begin implementing zero trust. The principles scale to any organisation; the complexity of implementation scales with the complexity of the environment.

Q: Does my business need a VPN if we implement zero trust?

A: It depends on your environment. If your staff primarily access cloud applications (Microsoft 365, cloud-hosted business software), a VPN may already be unnecessary — those applications are accessed directly over the internet, and zero trust controls are applied at the identity and device layer. If you have on-premises systems that need to be accessed remotely, you may still need network-level access, in which case a VPN may remain appropriate, ideally with strong authentication requirements layered on top. The goal of moving toward ZTNA (zero trust network access) for application-level remote access is a Phase 4 consideration — not a prerequisite for starting zero trust.

Q: How long does it take to implement zero trust for a small business?

A: Phase 1 — enforcing MFA and deploying baseline Conditional Access — can typically be completed in a matter of weeks for an SMB. Phases 2 through 5 play out over months to a year or more, depending on the complexity of the environment, the number of devices, the network infrastructure, and the pace of change the business can absorb. A managed service provider can accelerate this timeline significantly by handling design, deployment, and staff communication. The important thing is to start with the highest-impact controls rather than waiting until resources exist to do everything at once.

Q: Is zero trust the same as the ACSC Essential Eight?

A: They are related but not the same thing. The Essential Eight is a set of specific mitigation strategies that the ACSC recommends as a baseline for Australian organisations — controls such as patching applications, restricting macros, enabling MFA, and controlling administrative privileges. Zero trust is a broader architectural philosophy that describes how trust should be established and enforced across an environment. There is significant overlap: several Essential Eight controls are directly relevant to zero trust implementation, particularly MFA, restricting administrative privileges, patching, and application control. Implementing the Essential Eight at Maturity Level 2 or above puts a business well along the path of the first two phases of zero trust.