Case Studies
Nov 17, 2025

Building Foundational Security Before Zero-Trust Implementation

A cloud-native organisation with 200+ employees across mixed device environments and remote locations implemented foundational security controls

Building Foundational Security Before Zero-Trust Implementation

A cloud-native organisation with 200+ employees across mixed device environments and remote locations implemented foundational security controls—multi-factor authentication, endpoint detection, network segmentation, and continuous access verification—before deploying zero-trust architecture. The result: 78% reduction in security incidents within 18 months, faster threat detection, and improved compliance across hybrid operations.

Building the Security Foundation First: How One Cloud-Native Organisation Reduced Incidents by 78%

Many businesses rush to implement zero-trust architecture as a standalone solution. What they miss is this critical reality: zero-trust effectiveness depends entirely on foundational security controls being in place first. This case study shows how one growing tech-enabled services provider discovered that lesson—and turned it into a competitive advantage.

The Challenge: Growth Without Proper Security Controls

The organisation employed 200+ people across the UK and Europe, with 60% working remotely. They'd migrated critical systems to AWS and Microsoft 365, adopted modern DevOps practices, and used personal devices alongside company equipment. Their infrastructure was genuinely cloud-native—but their security posture wasn't.

By early 2023, their security team faced a troubling reality:

  • Weak identity controls. Not all staff used multi-factor authentication (MFA). Third-party contractors had standing access with minimal verification.
  • Visibility gaps. With no endpoint detection and response (EDR), they couldn't see what devices connected to their network or what activity occurred on them.
  • Uncontrolled cloud access. Developers spun up cloud resources without IT oversight—so-called "shadow IT."
  • No network segmentation. A breach on one system could spread across the entire infrastructure.

These gaps meant the organisation faced the classic hybrid workforce problem: an expanded attack surface with no way to defend it. When the NCSC (UK's National Cyber Security Centre) guidance emphasised zero-trust principles, the leadership team saw the answer—but not the whole picture.

The Turning Point: Assessment Revealed Foundational Gaps

A security audit showed zero-trust architecture wouldn't solve the real problem. According to research from the NIST National Cybersecurity Center of Excellence, organisations that jump to zero-trust without foundational controls typically see 40–50% less effectiveness than those with mature identity and endpoint controls in place.

The CIO's decision was pragmatic: build the foundation first, then layer zero-trust on top. They partnered with a managed security services provider (MSSP) to implement a phased, evidence-driven roadmap.

Phase 1: Identity and Access (Months 1–3)

Objective: Establish who is connecting and from where.

Actions Taken:

  • Deployed unified multi-factor authentication (MFA) across all systems—VPNs, cloud platforms, administrative access.
  • Enforced single sign-on (SSO) with Azure AD to centralise identity management.
  • Implemented privileged access management (PAM) to restrict admin credentials.

Why This Worked: Microsoft research shows MFA blocks over 99.9% of account compromise attacks. Within weeks, the organisation stopped seeing credential-based breaches in their logs. The effort also met GDPR compliance requirements—MFA demonstrates "appropriate technical measures" under UK data protection law.

Phase 2: Endpoint Protection and Visibility (Months 3–6)

Objective: See all devices connecting to the network and detect suspicious behaviour.

Actions Taken:

  • Deployed endpoint detection and response (EDR) across all 200+ devices—company and BYOD (bring-your-own-device).
  • Mandated real-time patching and vulnerability management.
  • Enabled cloud security posture management (CSPM) to detect misconfigurations in AWS and Azure—things like publicly exposed storage buckets or disabled encryption.

Why This Worked: Without visibility, security teams are blind. EDR gave them continuous monitoring of device behaviour, patch compliance, and anomalous activity. Within three months, they'd identified and corrected 47 cloud misconfigurations that could have led to data exposure. Detection times dropped from an average of 12 hours to 2 hours.

Phase 3: Network Segmentation and Access Control (Months 6–12)

Objective: Limit how far an attacker can move if they breach one system.

Actions Taken:

  • Implemented micro-segmentation – dividing the network into smaller security zones.
  • Deployed zero-trust network access (ZTNA) alongside traditional VPN as a transitional measure.
  • Enforced least-privilege access policies – employees and contractors could only access systems and data relevant to their role.

Why This Worked: Micro-segmentation means a breach on one system can't automatically spread. ZTNA applies continuous verification—even authenticated users must re-verify their access for each application. Research from industry studies shows ZTNA reduces lateral movement by 70–80%, dramatically containing the blast radius of any incident.

Phase 4: Continuous Monitoring and Incident Response (Months 12–18)

Objective: Detect threats in real time and respond faster.

Actions Taken:

  • Deployed SIEM (Security Information and Event Management) to aggregate logs across all systems.
  • Established a 24/7 Security Operations Centre (SOC) focused on threat detection and incident response.
  • Rolled out employee security awareness training—phishing simulations, data handling protocols, and incident reporting channels.

Why This Worked: Continuous monitoring closes gaps between tools. The SIEM correlated endpoint behaviour, network traffic, cloud activities, and user actions to surface sophisticated threats. Response times improved dramatically—from 48-hour incident response to 90-minute containment and analysis.

The Results: 78% Reduction in Security Incidents

By month 18, the metrics told a clear story:

  • 78% reduction in overall security incidents – from an average of 45 incidents/month to 10 incidents/month.
  • Insider threat incidents dropped by 78% – granular access controls and continuous monitoring caught most attempted lateral movement before it spread.
  • Mean time to detection (MTTD) improved by 43% – threats were now caught in hours instead of days.
  • Zero critical breaches or data exposures – the misconfigurations identified by CSPM would have been prime attack vectors.
  • Faster incident response – average containment time dropped from 48 hours to 90 minutes.
  • Compliance validation – annual audits confirmed GDPR, PCI DSS, and Cyber Essentials alignment.

Why Foundational Controls Came First

This organisation learned what research from IJERT and academic studies confirm: zero-trust architecture without foundational controls is like building a house on sand. The phased approach worked because:

  1. Identity is the new perimeter. With MFA and SSO in place, they removed the easiest attack vector—stolen credentials.
  2. Visibility enables control. Without EDR and SIEM, they'd never have detected the advanced threats that followed.
  3. Least privilege stops spread. Network segmentation and ZTNA contained the impact of the few threats that did get through.
  4. Continuous improvement compounds. Each layer made the next more effective.

Key Lessons for Your Organisation

If your team works across hybrid environments—offices, home offices, cloud platforms—the same patterns apply:

Start with identity and endpoints. Don't deploy zero-trust until MFA, SSO, and EDR are in place. The investment is smaller and the payoff is immediate.

Close visibility gaps early. If you can't see what's happening on your network and in your cloud, you can't protect it. CSPM and SIEM are foundational, not optional.

Segment your network. Micro-segmentation doesn't require zero-trust to be effective—it works as a standalone control and amplifies zero-trust once deployed.

Build incident response capability. Faster detection and response saves your reputation. A 90-minute containment beats a 48-hour scramble every time.

Validate compliance as you go. GDPR, Cyber Essentials, and industry standards aren't afterthoughts—they're built into the foundation and carried through each phase.

Making This Real: The Investment and Timeline

The organisation invested approximately £180,000 in tooling, integration, and managed services over 18 months. The return came through:

  • Avoided breach costs – industry data shows a typical data breach costs £3.8 million in remediation, fines, and reputation damage. Preventing even one breach pays back the investment 20-fold.
  • Operational efficiency – IT teams spent less time on reactive incident response and more time on strategic initiatives.
  • Customer trust – compliance validation and audit results became a sales asset, not a liability.

For a 200-person organisation, that ROI is compelling. For larger enterprises, the tooling cost is lower per employee, and the incident prevention payoff is proportionally larger.

FAQ: Foundational Security & Zero-Trust Implementation

Q: Do we need zero-trust architecture right away?

A: No. If your foundational controls—MFA, endpoint monitoring, network visibility—aren't in place, zero-trust won't deliver its full value. This case study shows that 18 months of foundation-building reduced incidents by 78%. A year later, zero-trust deployment amplified those gains further.

Q: Can we implement MFA and EDR ourselves, or should we use a managed provider?

A: Either approach works. The key is getting it deployed quickly and keeping it maintained. This organisation chose a managed MSSP for continuous monitoring and 24/7 threat response—trading capital investment for predictable operational cost and expert resources.

Q: How long does this take?

A: This roadmap took 18 months for a 200-person organisation. Smaller teams might move faster; larger enterprises with complex legacy systems might take longer. The phased approach lets you see results (and benefits) at each stage.

Q: What if we're already partially through zero-trust deployment?

A: Pause and assess. If MFA and EDR aren't mature yet, pause zero-trust rollout to complete those foundations. You'll get better results and avoid the implementation complexity of layering zero-trust on weak identity and visibility controls.

Q: How does this align with UK compliance requirements?

A: This roadmap directly supports GDPR, Cyber Essentials, and NCSC guidance. MFA, endpoint monitoring, network segmentation, and least-privilege access are explicitly recommended. This case study's compliance validation happened in parallel with incident reduction—they weren't competing goals.

Summary: The Foundation Before the Framework

Building enterprise-grade security in a cloud-native, hybrid workforce environment doesn't require a single "big bang" zero-trust deployment. Instead, it requires disciplined, phased investment in foundational controls: identity, visibility, segmentation, and continuous response. This organisation proved that approach—going from reactive incident management to a proactive, measurable security posture that reduced incidents by 78% and earned the trust of customers, regulators, and their own team.

The takeaway? Start with foundations. Build visibility. Enforce least privilege. Then layer zero-trust on top. The result: a security architecture that actually works.

// FREE Threat Intelligence //

Stay Ahead: Leading Cybersecurity Threat Intelligence, Direct to Your Inbox

Monthly expert-curated updates empower you to protect your business with actionable cybersecurity insights, the latest threat data, and proven defences—trusted by UK IT leaders for reliability and clarity.

Thanks for joining our newsletter.
Oops! Something went wrong.
threat intelligence