Architecting Zero Trust at Nation-Scale
Industry -

Critical Infrastructure

Project Category -

Zero Trust

Duration -

2022-ongoing

Scale -

5M+ users

Architecting Zero Trust at Nation-Scale

A major Swiss critical infrastructure organization had everything — and nothing.

40,000+ endpoints. 70,000+ employees. 5M+ users - employees, contractors, suppliers, partners, and customers unified under one federated identity fabric. 100+ subsidiaries across 3,500+ campus locations. Two public clouds, two on-premises datacenters. 100+ SaaS applications. Decades of security investments. No shortage of products.

The problem: none of it worked together.

The Scale


  • 40,000+ endpoints across the organization
  • 5M+ users - employees, contractors, suppliers, partners, and customers governed by one federated policy fabric (not one directory, but one policy plane)
  • 3,500+ campus locations throughout Switzerland and internationally
  • 100+ subsidiaries with varying security maturity
  • Hybrid multicloud spanning 2 public clouds and 2 on-premises datacenters
  • 100+ SaaS applications
  • Decades of legacy IT systems
  • Extensive IoT and OT infrastructure

The Challenge


Zero Trust doesn’t fail within components — it fails between them. And this organization had gaps everywhere.

The complexity had grown organically over decades. Each new threat prompted a new product. Each new product created new integration challenges. The security team was managing tools, not managing security.

  • Multiple identity systems with inconsistent policies across subsidiaries
  • Network segmentation reflecting historical org charts, not security requirements
  • Endpoint agents that didn’t share data with the SIEM
  • A SIEM that couldn’t see cloud workloads
  • Limited visibility into lateral movement across hybrid multicloud environments
  • Legacy systems that couldn’t simply be replaced or modernized overnight
  • Critical infrastructure classification bringing regulatory scrutiny from Swiss authorities and sector-specific regulators
  • Complex compliance requirements including nFADP and GDPR for cross-border operations

The trigger was clear: the old architecture couldn’t keep pace. Cloud and SaaS adoption accelerated. The highly distributed reality exposed the friction in legacy approaches. Cost pressure mounted as complexity grew. And emerging capabilities - from agentic AI to advanced threat detection - demanded an architecture that could actually support them. The existing model wasn’t just inefficient; it was blocking business requirements.

The organization needed more than incremental improvement. It needed a fundamental transformation - not more products, but integration of what they had. And this transformation had to occur without disrupting operations that millions of Swiss citizens and businesses depend on daily.

The Approach


The transformation was structured as a multi-year program rather than a point project. This reflected the reality that genuine Zero Trust transformation cannot be achieved in a quarter or even a year.

Phase 1: Vision, Market Research, Requirement Engineering

The program began with executive alignment sessions on Zero Trust vision and principles. This was not a technical exercise but a business conversation: what security outcomes did the organization need to achieve, and how did Zero Trust principles support those outcomes?

The requirement engineering process involved extensive stakeholder engagement across business units, IT operations, and security teams. Understanding the current state - the gaps, the pain points, the regulatory pressures - was essential before any architecture work could begin. Market research evaluated available technologies and approaches, not to select vendors but to understand what was possible and what constraints existed.

This phase produced a comprehensive requirements baseline: what the organization needed to achieve, what regulatory obligations had to be met, and what operational constraints any solution would need to accommodate.

Phase 2: Architecture Design and Business Case

With requirements defined, the architecture design phase addressed all Zero Trust pillars through practical design exercises:

  • How would identity and access management work across the diverse environment?
  • How would network segmentation be implemented without disrupting application dependencies?
  • How would legacy systems that could not participate in modern protocols be accommodated?
  • How would OT and IoT infrastructure be integrated without disrupting industrial operations?

As a vendor-neutral architect, I systematically evaluated solutions across Gartner Magic Quadrants and Forrester Waves for SSE, SASE, SD-WAN, and adjacent security categories. The target architecture was built from 4 complementary platforms, orchestrated to work as one integrated system rather than competing point solutions. The architecture explicitly addressed integration requirements, migration paths, and coexistence approaches. OT and IoT environments were subject to the same identity-aware policies as everything else - north-south access through the Zero Trust Edge, east-west access through microsegmentation. Legacy OT systems were integrated using a brownfield approach, wrapping non-compliant hardware in identity-aware proxies to enforce zero trust without touching sensitive endpoints.

Securing investment required navigating a complex organizational structure with multiple governance layers. The business case was presented to the IT Management Board, then escalated to the Executive Board, and finally to the Board of Directors. In June 2025 - after nearly three years of architecture work that began in September 2022 - the Board approved funding for the transformation program.

Phase 3: Integration Patterns and Blueprints

Before implementation could begin, detailed integration blueprints were developed for each component interaction. The architecture was designed to be implemented incrementally, delivering value at each stage - but this required precise specifications of how each integration would work.

Key blueprint areas included:

  • Identity federation patterns across 100+ subsidiaries with varying maturity levels
  • Device trust establishment workflows spanning managed endpoints, BYOD, and contractor devices
  • Network segmentation blueprints defining zone boundaries and policy enforcement points
  • Legacy system integration patterns using proxy-based identity injection
  • OT/IoT integration specifications maintaining operational safety while enabling visibility

Each blueprint included rollback procedures, coexistence approaches for phased migration, and validation criteria. Extensive testing preceded any production deployment, ensuring that integration patterns were proven before scale implementation.

Phase 4: Implementation and Operationalization

With board approval secured, implementation began in January 2026. Rollout proceeded in waves, prioritizing high-risk areas while building foundational capabilities:

  • Identity consolidation and enhancement across the unified identity fabric
  • Device trust establishment for 40,000+ endpoints
  • Network segmentation implementation through microsegmentation

Critical to success was maintaining operational continuity. Every change was designed with rollback capability, and the blueprints developed in Phase 3 guided each deployment.

Technology deployment alone does not achieve Zero Trust outcomes. The program included significant investment in operational integration:

  • Updated security operations processes aligned with new architecture
  • Enhanced monitoring and alerting leveraging improved visibility
  • Incident response procedure updates reflecting new capabilities
  • Training across technical teams on Zero Trust operations

The Results


Risk Reduction

  • Dramatic reduction in lateral movement exposure through microsegmentation - from flat network segments spanning thousands of hosts to isolated workload zones with explicit allow-list policies
  • Reduced identity-based attack surface through conditional access and continuous verification

Regulatory Compliance

  • Full alignment with Swiss regulatory requirements for operational risk and IT security
  • Compliant data protection practices supporting nFADP and GDPR requirements for cross-border operations
  • Critical regulatory findings closed within 6 months of program initiation

Operational Efficiency

  • Improved visibility enabling faster threat detection and response
  • Reduced alert volumes through better signal quality
  • Security teams able to focus on genuine threats rather than false positives

Foundation for Future

  • AI integration capability for threat detection and response automation
  • Security as platform for business enablement rather than obstacle
  • Architecture foundation enables rapid capability deployment as implementation progresses

Key Lessons


  1. Executive sponsorship is essential. Zero Trust transformation is too significant to succeed as a bottom-up initiative. Board-level support, funded program status, and executive accountability were critical success factors.

  2. Architecture must accommodate reality. Theoretical Zero Trust purity is less valuable than practical Zero Trust improvement. The architecture explicitly addressed legacy systems, diverse environments, and operational constraints.

  3. Deployment is not adoption. Technology deployment is necessary but not sufficient. Operational integration, process updates, and training determine whether technology investments actually deliver security outcomes.

  4. Measurement enables improvement. Clear metrics and measurement from program initiation enabled data-driven decisions, demonstrated value to stakeholders, and identified areas requiring additional attention.

Engagement Model


This transformation was led internally with architecture leadership provided by me as the embedded expert - providing strategic direction, designing the Zero Trust reference architecture, chairing the design authority, and ensuring integration coherence across the entire organization. Internal teams and implementation partners executed under my technical oversight. This model combined deep organizational knowledge with external expertise, avoiding both the knowledge gaps of pure external consulting and the resource constraints of purely internal delivery.

Commencer

Prêt à transformer votre posture de sécurité ?

Que vous ayez besoin d'un Zero Trust Maturity Assessment, d'une revue d'architecture de sécurité ou de conseils sur l'intégration de l'IA dans vos opérations - discutons de votre situation spécifique. Pas de processus de vente. Pas d'entretiens préliminaires avec des juniors. Une conversation directe sur vos défis.

00 +

Ans

De l'évaluation à l'architecture jusqu'à l'implémentation

0

Secteurs

Logistique, transports, finance, secteur public

000 %

Indépendant

Aucun partenariat. Aucune commission. Vos intérêts uniquement.