top of page

Zero Trust in Action: Why Every Organization Needs to Rethink Security

Updated: Aug 21

ree


Why This Idea Came to Me

Working with defence research organisations offered a front-row view of how thorough security needs to be when even a tiny mistake can sabotage critical operations. Every laptop is tracked, every access logged, every update enforced. Nothing is assumed safe—trust must be earned.

But outside these circles—in private companies, schools, non-profit, and charitable organizations—I often saw a very different picture. Shared accounts. Open networks. Weak or missing logs. Sometimes the problem was simple laziness: “Why enable MFA? It’s just another click.” Other times, it was leadership decisions made to avoid costs: “Why spend on licenses when it’s not mandatory?”

That contrast made me realize how urgently we need to shift our mindset. Security is not a “nice-to-have” or something only the biggest organizations should care about. It’s essential, and Zero Trust is the framework that can bridge that gap.



What Zero Trust Really Means


ree

Zero Trust is not just a product you buy or a buzzword you use in presentations. It’s a philosophy that says:

“Never trust, always verify.”

In simple words: just because someone is inside the building doesn’t mean they should have the keys to every locked door. Similarly, just because a user is inside your network doesn’t mean they should have access to all systems and data.



Common Misconception

A major misconception I’ve seen is that strong security equals high cost. Many organizations chase expensive, well-known products simply because “everyone else uses them.” For example, Windows Server environments require purchase costs and per-user licensing fees.

Meanwhile, open-source platforms like CentOS Linux can provide enterprise-grade security at zero licensing cost. With the right design, they can stand shoulder-to-shoulder with paid products—and sometimes even surpass them.

Security is not about how much you spend. It’s about how wisely you architect it.



Core Principles of Zero Trust (in Simple Terms)

  • Verify Every User, Every Time — enforce MFA, use role-based access, assign unique credentials.

  • Least Privilege Access — grant users only the permissions they need—nothing more.

  • Segment & Isolate — control traffic between users, devices, and services.

  • Continuous Monitoring — audit every action, not only user logins.


Analogy: Think of an office: you can enter the building, but you still need permission to open certain cabinets, conference rooms, or safes.



Monitoring & Visibility

Without visibility, there is no security.

Yes, enterprise tools like Syslog, Wazuh, and the ELK stack offer deep insights—but even simpler tools can radically improve visibility. Samba’s full_audit log, for example, lets you log every file action in real time—answering key questions like who accessed which file, when, and what action they performed.

For example, Samba’s full_audit log allowed me to monitor file activity in real-time—answering critical questions like who accessed which file, when, and what action they performed. For one organization, this was a game-changer in accountability, even without expensive software.



Case Examples from My Work

  1. Defense Environment - In my current role supporting defense research, every laptop deployment includes multi-factor authentication, centrally enforced policies, and strict, role-based access. There’s no room for assumptions like “I know this person—let them in.” Every action demands authorization. This is Zero Trust in its purest form—verification, not familiarity.

  2. Samba Audit Logs for Transparency - In a previous role, leadership hesitated to invest in costly security products. But a limited budget should never mean limited protection. After research and testing, I deployed Samba with audit logging. This provided full visibility into user actions—without any licensing cost. It proved that security is possible even for organizations with tight budgets.

  3. OpenVPN for Secure Remote Access - When the pandemic forced employees to work remotely, I implemented OpenVPN with unique user credentials. This eliminated the risks of shared accounts and gave employees secure, role-based access to systems from anywhere. Again, this was accomplished at no additional software cost—just thoughtful design and implementation.



Why Zero Trust Matters

Cyberattacks are no longer a matter of “if,” but “when.” For small and medium organizations, a single incident can cause operational downtime, reputational damage, or even closure. By adopting Zero Trust, you build business resilience—ensuring that even if attackers breach your perimeter, your systems stay secure, your operations continue, and your data remains protected.



Why Zero Trust Benefits Everyone

  • Stops Insider & External Threats – Protects against both intentional breaches and careless mistakes.

  • Cost-Efficient – Open-source solutions keep security strong without draining budgets.

  • Scalable – Works for small charities, growing businesses, and global enterprises alike.

  • Career & Professional Growth – In today’s environment where cyberattacks are daily news, security-focused professionals are in demand. Mastering Zero Trust is not just about protecting data—it’s about building credibility as a leader.



Final Thoughts

Zero Trust is not a product. It’s not a checkbox. It’s a mindset shift.

I’ve seen both extremes: defense environments where security is sacred, and smaller organizations where shortcuts risk everything. What I’ve learned is this: security can’t be left to chance, laziness, or budget excuses.

If you’re an IT professional, business owner, or a decision-maker at a charitable organisation—start asking the hard questions now. Don’t wait for a breach. Don’t assume you’re safe just because “nothing has happened yet.”

The future of IT security is clear: trust nothing, verify everything.


4 Comments


I really appreciate your way to explain. One of the best articles I have ever studied over security 👍

Like
Replying to

Thank you so much for your kind words — truly means a lot.


I’m really glad the explanation was helpful and added value to your understanding of security. Your encouragement motivates me to keep sharing more in-depth and meaningful content.

Like

A very insightful article and truly relevant to today's IT landscape. An absolute need in the current times!

Like
Replying to

Thank you so much! I’m glad you found it insightful and relevant. It’s definitely a topic that more teams need to pay attention to in today’s IT environment. Appreciate your feedback!

Like
ChatGPT Image Jul 29, 2025, 11_29_51 AM.png

For professional inquiries, collaborations, or consulting opportunities:
✉️ mohammad@zuhaib.co.uk
🌐 www.zuhaib.co.uk

Quick Links

Connect With Me

  • LinkedIn

© 2025 by Mohammad Zuhaib.

All rights reserved.

bottom of page