Aug 15 2025
Security

A Simple Zero-Trust Security Playbook for SMBs

Achieving zero trust doesn’t have to be overly complex or prohibitively expensive.

The simplest way to think of zero trust is as a philosophy: Never implicitly trust users or devices, always verify them.

The more official definition, according to the National Institute of Standards and Technology is, “a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised.”

The principle of least privilege is especially important when understood in the context of breakout time, which is how long it takes a hacker to move from initial access to another system. According to CrowdStrike, that time has reached a record low in 2024. Once one system is breached, moving into others using stolen credentials is far easier, especially within public cloud environments.

Zero-trust architecture provides a potential antidote for small and medium-sized businesses. This is partly because the less privilege a user has, the harder it will be for hackers to move laterally.

This raises a question: How does an SMB go about achieving zero trust?

Click the banner below for exclusive cybersecurity insights.

 

Zero Trust Is a Strategy, Not a Solution

There is no such thing as zero trust in a box. Rather, zero trust is a strategy achieved through the right combination of people, processes and technologies. They’re all related and work together to make SMBs more secure.

People

“When a request looks plausible enough, staff may default to trust rather than protocol, and that’s when things can go wrong,” writes Eric Marchewitz, a field solution architect at CDW. “This constitutes the opposite of zero trust.”

Regardless of how many safeguards a company institutes, there will always be the risk of a person unwittingly trusting a bad actor. The best way to avoid this, Marchewitz writes, is with user awareness training.

“Everyone from the finance department to marketing should know the red flags to watch out for and what steps to take if something feels off,” he writes. “Combine that with regular training, and you create not just cybersecurity awareness, but true cyber resilience.”

Particularly in very small businesses, it’s not unusual for new zero-trust initiatives to be met with some resistance. As part of the training, it’s important to educate users on the benefit of zero trust.

EXPLORE: SMBs are in nation-state hackers’ crosshairs.

Process and Policy

Process ultimately refers to how people go about their business, and policy is key in governing that activity.

“It's not unusual for a 100-person company to have just a few folks in the finance office who receive and process most, if not all, invoices,” Marchewitz writes. “If those people are targeted with a convincing fake invoice or a spoofed email from a vendor or customer, the odds of an error are high, especially if there’s no policy requiring a second verification step.”

Defining the attack surface is a key first step in architecting policies, according to Fortinet. It will help you identify the systems that are most important to your business operations. You will also walk away with a clearer understanding of the risks to those systems. Zero-trust principles such as least-privilege access, user verification, continuous monitoring and assuming you’ve been branched can all be baked into the process. Policies can be created around defining zero-trust within processes.

Technology

For all of this to work, an SMB will need to implement technologies that enforce zero-trust principles across an IT environment. The list of tools can add up quickly, leading to what Jeremy Weiss, an executive security strategist at CDW, calls “zero-trust tool fatigue.” The key is to make sure the tools are in service to your people and your processes.

“It’s important to ensure that your zero-trust strategy is aligned to your company goals, priorities, risks and culture before selecting or installing additional zero-trust tools,” Weiss writes. The exact tools will therefore vary somewhat based on your ability to define your goals and identify your risks. 

For the vast majority of SMBs, some combination of the following resources will suffice:

  • Identity and access management: IAM is key to provisioning user identities, granting access and enforcing the principle of least privilege.
  • Multifactor authentication: MFA, which is offered as a feature in popular IAM tools including Okta’s, verifies user identities through multiple independent factors. This is critical to helping foil phishing attacks and other attempts to falsify trustworthiness.
  • Zero-Trust Networking Architecture: ZTNA, or alternatively, secure access security edge (SASE), help enforce conditional access. In other words, they enable network access based on predefined policies and continuous verification.
  • Endpoint detection and response: EDR, which is sometimes a feature of mobile device management offerings, monitors actual endpoints for suspicious or anomalous activity.
  • Managed detection and response: MDR or a similar service can analyze data in more advanced ways to detect even subtle anomalies.

Click the banner below to keep reading stories from our new publication, BizTech: Small Business.

 

Pro Tip: Consolidate Wherever Possible

In the interest of maintaining operational efficiency, SMBs may want to consider consolidating certain services as they implement different solutions.

For example, Microsoft, Google and AWS typically provide IAM as a service to customers using their cloud environments. This may or may not be sufficient depending on the tools your business uses. Entra ID might be sufficient for Microsoft environments, but Okta excels at delivering an intuitive single sign-on experience for multiapplication scenarios.

The key is to focus on your business’s needs and cover your bases according to those needs.

laddawan punna/Getty Images
Close

See How Your Peers Are Leveling Up Their IT

Sign up for our financial services newsletter and get the latest insights and expert tips.