Friday, March 20, 2020

Deep Dive Series 2020 – Part 1: From Chaos to Continuity: The Architectural Shockwave of 2020

March 2020   |   Reading time: 6 minutes

The events of early 2020 served as a stark reminder of how fragile enterprise IT environments can be when pushed beyond their design assumptions. Practically overnight, organizations worldwide were forced into remote operations, often without warning or time for proper planning. The result was a true architectural shockwave.

The Breaking Point

Prior to the pandemic, most corporate architectures were built with implicit assumptions: predictable traffic flows, perimeter-centric security, localized access models, and a workforce that largely operated on-site. These assumptions crumbled quickly as entire companies shifted to home offices, bringing with them a chaotic influx of unmanaged devices, bandwidth stress, and control plane fragmentation.

Remote Access: The First Stress Test

Many organizations saw their VPNs buckle under unexpected loads. Legacy concentrators couldn’t scale, licensing models became a bottleneck, and split-tunneling debates resurfaced. The rapid procurement of cloud-based VPN gateways, SD-WAN reconfigurations, and interim access solutions exposed how unprepared many were for a true 'work from anywhere' scenario.

Security Revisited

Security policies written for office environments fell short when applied to home-based operations. Endpoint security coverage dropped, multi-factor authentication was patchy, and lateral movement risks increased dramatically. Shadow IT also surged, as employees sought tools to remain productive without IT gatekeeping.

Collaboration and Application Access

With cloud applications like Zoom, Teams, and Google Workspace becoming lifelines, architecture shifted from centralization to federation. SaaS access had to be normalized, monitored, and controlled—requiring rapid deployment of identity federation, CASB solutions, and application-aware firewalls.

Monitoring Blind Spots

Network Operations Centers (NOCs) struggled as visibility evaporated. Home ISPs, VPN paths, and public cloud latency introduced new telemetry blind spots. IT teams were caught without adequate tools to observe and respond to performance issues in real time.

Quick Fixes vs. Architectural Debt

Some organizations responded with agility, spinning up cloud proxies, deploying zero trust pilots, or onboarding SD-WAN edge appliances. Others fell back on reactive band-aids that now persist as technical debt. The distinction is important: some architectures flexed, others fractured.

The Cultural Component

This architectural chaos was not just technical—it was cultural. The role of the architect, the voice of infrastructure, and the cohesion between IT and business stakeholders all came under pressure. Success depended as much on communication and coordination as it did on toolsets and platforms.

Lessons from the Shockwave

  • Architectures must assume disruption—not stability—as a baseline.
  • Cloud-native models and SaaS-first strategies showed real advantages.
  • Identity is the new perimeter—but it must be properly integrated.
  • Resilience is about preparedness, not prediction.

Looking back, the architectural shockwave of 2020 was both a test and a turning point. It exposed fragile designs, accelerated digital maturity for some, and redefined what modern enterprise architecture must accommodate moving forward.


Eduardo Wnorowski is a network infrastructure consultant and Director.
With over 25 years of experience in IT and consulting, he helps organizations maintain stable and secure environments through proactive auditing, optimization, and strategic guidance.
LinkedIn Profile

This is Part 1 of a 3-part deep dive series for 2020.

  • Part 1: From Chaos to Continuity: The Architectural Shockwave of 2020 (you are here)
  • Part 2: Adaptive Frameworks and Design Thinking (coming next)
  • Part 3: Designing for the Unknown: Lessons in Resilience (to be published)

Sunday, March 1, 2020

Zero Trust Networking in Practice: Architectures, Policies, and Deployment Lessons

March, 2020 • 14 min read

Introduction

By March 2020, Zero Trust is no longer just a security buzzword—it’s a practical architectural goal for organizations of all sizes. With the rapid rise of remote work, the proliferation of SaaS, and the increasing complexity of hybrid networks, the concept of a trusted perimeter collapses. Instead, enterprises are turning to Zero Trust Network Architectures (ZTNA) to enforce least privilege, identity-aware access control, and continuous trust evaluation. This post explores how Zero Trust evolved into real deployments by 2020, unpacking the architectures, policy engines, enforcement layers, and operational challenges of implementation. By March 2020, Zero Trust is no longer just a security buzzword—it’s a practical architectural goal for organizations of all sizes. With the rapid rise of remote work, the proliferation of SaaS, and the increasing complexity of hybrid networks, the concept of a trusted perimeter By March 2020, Zero Trust is no longer just a security buzzword—it’s a practical architectural goal for organizations of all sizes. With the rapid rise of remote work, the proliferation of SaaS, and the increasing complexity of hybrid networks, the concept of a trusted perimeter collapses. Instead, enterprises are turning to Zero Trust Network Architectures (ZTNA) to enforce least privilege, identity-aware access control, and continuous trust evaluation. This

The Core Tenets of Zero Trust

The foundation of Zero Trust lies in a simple but powerful principle: never trust, always verify. Access is not granted based on location (inside or outside the network) but on identity, context, and policy compliance. The five pillars of Zero Trust in network security are: The foundation of Zero Trust lies in a simple but powerful principle: never trust, always verify. Access is not granted based on The foundation of Zero Trust lies in a simple but powerful principle: never trust, always verify. Access is not granted based on location (inside or outside the network) but on identity, context, and

  1. User and Device Identity – Authentication must validate the user and ensure the device meets posture requirements.

  2. Least Privilege Access – Users and services get only the access they require, no more.

  3. Microsegmentation – The network is divided into zones, and communication is explicitly allowed between them.

  4. Continuous Monitoring – Sessions are evaluated throughout their lifespan, not just at the start.

  5. Policy Enforcement – Access policies are centrally managed and enforced at the edge or application layer.

Architectural Models for ZTNA

There are several ways to implement Zero Trust, depending on the organization’s maturity and technical constraints: There are several ways to implement Zero Trust, There are several ways to implement Zero Trust, depending on the organization’s

  • Software-Defined Perimeter (SDP): Logical perimeter where devices must authenticate before application access is granted. Solutions like Zscaler Private Access and Google BeyondCorp use this model. - **Software-Defined Perimeter (SDP)**: Logical perimeter where devices must authenticate before application access - **Software-Defined Perimeter (SDP)**: Logical perimeter where devices must authenticate before application access is granted. Solutions like Zscaler Private

  • Network-Based Microsegmentation: Using L4-L7 firewalls or SDN controllers to segment networks based on zones and identity. - **Network-Based Microsegmentation**: Using L4-L7 firewalls or SDN - **Network-Based Microsegmentation**: Using L4-L7 firewalls or SDN controllers to segment networks

  • Identity-Aware Proxying: Applications are fronted by access gateways that validate sessions against policy and identity before forwarding traffic. - **Identity-Aware Proxying**: Applications are fronted by access gateways - **Identity-Aware Proxying**: Applications are fronted by access gateways that validate sessions against policy

  • Agent-Based Models: Devices install endpoint agents that perform posture checks and enforce access based on risk signals. Examples include Illumio and Palo Alto Prisma Access. - **Agent-Based Models**: Devices install endpoint agents that perform posture checks and enforce - **Agent-Based Models**: Devices install endpoint agents that perform posture checks and enforce access based on risk signals. Examples

  • Overlay Network Models: Abstract the network layer entirely with secure tunnels and routing based on identity and context, e.g., NetFoundry or Twingate. - **Overlay Network Models**: Abstract the network layer entirely with secure - **Overlay Network Models**: Abstract the network layer entirely with secure tunnels and routing based on identity

Policy Design and Enforcement

The success of Zero Trust depends on how well the policies are crafted. Policies need to be granular but manageable. Most mature implementations rely on attribute-based access control (ABAC), which considers multiple inputs: The success of Zero Trust depends on how well the policies are crafted. Policies need to The success of Zero Trust depends on how well the policies are crafted. Policies need to be granular but manageable. Most mature implementations rely

  • User Role – Sourced from AD, Okta, or other identity platforms.

  • Device Posture – Checked via EDR, MDM, or posture validation services.

  • Location and Time – Conditional access based on geolocation or business hours.

  • Application Sensitivity – Policies vary based on the data classification of the target app.

Policies are often encoded using policy-as-code tools like Open Policy Agent (OPA), HashiCorp Sentinel, or embedded into network policy engines. Enforcement can happen at the firewall, proxy, or application level. In 2020, many enterprises begin enforcing policies inside Kubernetes clusters using Cilium or Calico, combining service identity with pod metadata. Policies are often encoded using policy-as-code tools like Open Policy Agent (OPA), HashiCorp Sentinel, or embedded into network policy engines. Enforcement can happen at the Policies are often encoded using policy-as-code tools like Open Policy Agent (OPA), HashiCorp Sentinel, or embedded into network policy engines. Enforcement can happen at the firewall, proxy, or application level. In 2020, many enterprises begin enforcing policies

Authentication, MFA, and Identity Federation

At the heart of Zero Trust is identity. Without robust, federated identity systems, Zero Trust cannot scale. In 2020, most enterprises standardize on SAML 2.0 or OpenID Connect for SSO. Multi-Factor Authentication (MFA) becomes table stakes—SMS-based options are phased out in favor of push-based MFA or hardware tokens like YubiKeys. Federation across business units, partners, and clouds is enabled via identity brokers like Azure AD, PingFederate, or Okta Universal Directory. These brokers issue tokens that are short-lived and scoped, enabling tight access boundaries. Passwordless authentication starts to gain traction using device biometrics and certificate-based flows. At this point, centralized identity is not optional—it’s the control plane for the entire trust model. At the heart of Zero Trust is identity. Without robust, federated identity systems, Zero Trust cannot scale. In 2020, most enterprises standardize on SAML 2.0 or OpenID Connect for SSO. Multi-Factor Authentication (MFA) becomes table stakes—SMS-based options are phased out in favor of push-based MFA or hardware tokens like YubiKeys. Federation across business units, partners, At the heart of Zero Trust is identity. Without robust, federated identity systems, Zero Trust cannot scale. In 2020, most enterprises standardize on SAML 2.0 or OpenID Connect for SSO. Multi-Factor Authentication (MFA) becomes table stakes—SMS-based options are phased out in favor of push-based MFA or hardware tokens like YubiKeys. Federation across business units, partners, and clouds is enabled via identity brokers like Azure AD, PingFederate, or Okta Universal Directory. These brokers issue tokens that are short-lived and scoped, enabling tight access boundaries.

Device and Endpoint Posture

User identity is only half the equation. Devices must also be evaluated continuously. Endpoint Detection and Response (EDR) tools such as CrowdStrike, SentinelOne, and Microsoft Defender ATP provide risk scores and signals that feed into access decisions. MDM platforms enforce policies like disk encryption, OS version compliance, or app whitelisting. In mature setups, devices that drift out of compliance are automatically quarantined or pushed into remediation workflows. In early 2020, COVID-19 lockdowns accelerate BYOD and remote access adoption, creating a surge in demand for posture-aware access control. VPNs are increasingly replaced by cloud-based ZTNA agents that check both identity and device before allowing any lateral movement. User identity is only half the equation. Devices must also be evaluated continuously. Endpoint Detection and Response (EDR) tools such as CrowdStrike, SentinelOne, and Microsoft Defender ATP provide risk scores and signals that feed into access decisions. MDM platforms enforce policies like disk encryption, OS version compliance, or app whitelisting. In mature setups, User identity is only half the equation. Devices must also be evaluated continuously. Endpoint Detection and Response (EDR) tools such as CrowdStrike, SentinelOne, and Microsoft Defender ATP provide risk scores and signals that feed into access decisions. MDM platforms enforce policies like disk encryption, OS version compliance, or app whitelisting. In mature setups, devices that drift out of compliance are automatically quarantined or pushed into remediation workflows. In early 2020, COVID-19 lockdowns accelerate BYOD and remote access adoption, creating

Network Enforcement and Microsegmentation

Segmentation is a critical piece of Zero Trust. Without it, a single compromised device can pivot across the environment. In 2020, many organizations shift from VLAN-based segmentation to identity-based segmentation. Solutions like Cisco Tetration, VMware NSX, and Illumio enable enforcement based on application context, user roles, and workload identity. For cloud-native environments, Kubernetes Network Policies and service meshes like Istio help enforce L4-L7 segmentation between services. The biggest challenge remains visibility: mapping dependencies before writing policies. This is often achieved through passive traffic analysis, flow monitoring, or deploying in “monitor mode” before switching to enforce. Organizations that rush enforcement without adequate visibility often trigger outages and policy conflicts. Segmentation is a critical piece of Zero Trust. Without it, a single compromised device can pivot across the environment. In 2020, many organizations shift from VLAN-based segmentation to identity-based segmentation. Solutions like Cisco Tetration, VMware NSX, and Illumio enable enforcement based on application context, user roles, and workload identity. For cloud-native environments, Kubernetes Network Segmentation is a critical piece of Zero Trust. Without it, a single compromised device can pivot across the environment. In 2020, many organizations shift from VLAN-based segmentation to identity-based segmentation. Solutions like Cisco Tetration, VMware NSX, and Illumio enable enforcement based on application context, user roles, and workload identity. For cloud-native environments, Kubernetes Network Policies and service meshes like Istio help enforce L4-L7 segmentation between services. The biggest challenge remains visibility: mapping dependencies before writing policies. This is often achieved through

Challenges in Implementation

While the theory of Zero Trust is elegant, the reality is complex. Challenges include: While the theory of Zero Trust is While the theory of Zero Trust is elegant, the reality

  • Policy Sprawl – Too many policies managed across different systems become brittle.

  • Tool Overload – Multiple vendors with overlapping capabilities increase cost and confusion.

  • Skill Gaps – Not all IT teams have experience with identity federation, policy-as-code, or microsegmentation.

  • User Experience – Poorly designed policies create friction and drive users to bypass controls.

  • Legacy Applications – Some systems don’t support modern auth standards or break under strict segmentation.

To succeed, Zero Trust programs require not just tools, but alignment between InfoSec, networking, identity, and application teams. Governance is key, as is leadership sponsorship. To succeed, Zero Trust programs require not just tools, but alignment between To succeed, Zero Trust programs require not just tools, but alignment between InfoSec, networking, identity, and application teams.

Case Study Snapshots

  1. Global Healthcare Provider – Rolled out Zscaler Private Access across 12,000 users during COVID-19. Used Okta for identity, CrowdStrike for posture validation, and integrated policy enforcement at the application layer.

  2. FinTech Startup – Designed from scratch using cloud-native Zero Trust. All applications proxied behind Cloudflare Access with SSO, device posture, and geolocation gating.

  3. Government Entity – Migrated legacy VPN to SDP model using Palo Alto Prisma Access. Integrated with Microsoft Defender ATP and used Azure AD Conditional Access to enforce policies.

Each of these cases shows a different maturity level, but all emphasize staged deployment, visibility-first approaches, and identity as the cornerstone. Each of these cases shows a different maturity level, but Each of these cases shows a different maturity level, but all emphasize staged deployment, visibility-first

Conclusion

Zero Trust in 2020 moves from aspiration to execution. Fueled by global events and cloud transformation, organizations begin rethinking access not as a binary perimeter but as a continuous decision process. Identity, posture, context, and policy all work together to ensure that only the right entity accesses the right resource under the right conditions. As tooling matures and architectural patterns solidify, Zero Trust is no longer reserved for elite tech companies—it becomes a roadmap for all organizations seeking security in a perimeter-less world. Zero Trust in 2020 moves from aspiration to execution. Fueled by global events and cloud transformation, organizations begin rethinking access not as a binary perimeter but as a continuous decision process. Identity, posture, context, and policy all work together to ensure Zero Trust in 2020 moves from aspiration to execution. Fueled by global events and cloud transformation, organizations begin rethinking access not as a binary perimeter but as a continuous decision process. Identity, posture, context, and policy all work together to ensure that only the right entity accesses the right resource under the right conditions. As tooling matures and architectural patterns solidify, Zero

ZTNA vs Traditional VPNs

A common misconception in 2020 is that Zero Trust is just a more secure VPN. In reality, ZTNA represents a fundamental shift in access architecture. Traditional VPNs extend the network perimeter to the user, which often results in overprivileged access. Once connected, users can often see and reach internal systems beyond their intended scope. ZTNA, on the other hand, operates on the principle of application segmentation. Users authenticate and are granted access to specific applications—not the entire network. This distinction becomes critical during large-scale remote work rollouts. ZTNA solutions don’t require users to be placed on a flat internal IP space. They also offer better scalability, audit logging, and dynamic policy enforcement. In 2020, as VPN concentrators buckle under user load and split-tunneling introduces risk, ZTNA emerges as the modern alternative that enables fine-grained control and better user experience simultaneously. A common misconception in 2020 is that Zero Trust is just a more secure VPN. In reality, ZTNA represents a fundamental shift in access architecture. Traditional VPNs extend the network perimeter to the user, which often results in overprivileged access. Once connected, users can often see and reach internal systems beyond their intended scope. ZTNA, on the other hand, operates on the principle of application segmentation. Users authenticate and are



Eduardo Wnorowski is a network infrastructure consultant and Director.
With over 25 years of experience in IT and consulting, he helps organizations maintain stable and secure environments through proactive auditing, optimization, and strategic guidance.
LinkedIn Profile

AI-Augmented Network Management: Architecture Shifts in 2025

August, 2025 · 9 min read As enterprises grapple with increasingly complex network topologies and operational environments, 2025 mar...