Zero trust cost by NIST CISA pillar
The CISA Zero Trust Maturity Model defines five pillars that drive cost. This page breaks each one down: what it covers, what you need to buy, what it costs at SMB / mid-market / enterprise scale, vendor categories competing in the pillar, and the most common over-spend traps.
Identity
30-40% of budgetThe foundation. Every other zero trust pillar depends on a strong identity layer to make access decisions. SSO consolidates application access. Phishing-resistant MFA addresses the dominant attack vector. PAM contains the blast radius of compromised privileged accounts. Identity governance ensures access stays correct over time.
- SSO + basic MFA$3-$7 / user / monthConditional access, group-based provisioning. Often bundled into productivity suites.
- Identity P2 / advanced$6-$12 / user / monthRisk-based MFA, just-in-time admin (PIM), identity protection signals.
- PAM$15-$40 / user / monthPrivileged session recording, secrets vault, just-in-time elevation. Cost based on privileged user count, not total workforce.
- Identity governance$7-$20 / user / monthAccess reviews, entitlement management, lifecycle automation, attestations.
- FIDO2 hardware keys$25-$50 / user one-timePhishing-resistant MFA hardware. Required for federal contractors and highly recommended for privileged accounts.
Microsoft Entra, Okta Workforce Identity, Ping Identity, JumpCloud, ForgeRock. PAM: CyberArk, BeyondTrust, Delinea. Governance: SailPoint, Saviynt.
- Buying full PAM before stabilising basic MFA. Phase identity in this order: SSO consolidation, MFA on privileged accounts, MFA universal, then PAM.
- Underestimating the lifecycle automation effort. Joiner / mover / leaver flows touch HR, ITSM, and every connected app. Allocate 30-50% of identity-pillar PS to lifecycle.
- Skipping identity governance. Without quarterly access reviews and entitlement management, the MFA and SSO investment degrades within 18 months as access drift accumulates.
Device
15-20% of budgetDevices accessing corporate resources must be known, configured, and continuously assessed for compliance. MDM/UEM enrols and configures. EDR detects active threats. Posture signals feed conditional access decisions. The pillar is comparatively cheap once you accept that every endpoint must be enrolled and protected.
- MDM / UEM$4-$9 / device / monthConfiguration policies, certificates, app deployment, compliance reporting.
- EDR$3-$15 / endpoint / monthBehavioural detection, response actions, threat hunting. Premium tiers add managed response (effectively MDR).
- Mobile threat defence$3-$6 / mobile device / monthPhishing protection on mobile, OS exploit detection. Optional in low-risk verticals.
- Asset / posture management$2-$5 / endpoint / monthContinuous configuration drift detection, hardware inventory, vulnerability state.
MDM: Microsoft Intune, Jamf, Workspace ONE, Kandji. EDR: CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Palo Alto Cortex XDR.
- Buying separate MDM and EDR when M365 E5 already includes both via Intune and Defender for Endpoint P2. For Microsoft estates, audit existing licences before buying.
- Treating BYOD as out of scope. Personal device access to corporate apps is a meaningful zero trust risk and requires either MAM (app-level controls) or device-trust enforcement. Either way, add 10-20% to device-pillar cost.
- Skipping mobile. Mobile threat defence is often deprioritised, then re-introduced after a phishing incident on a personal phone. Budget for it in the initial scope.
Network
20-30% of budgetReplace IP-based perimeter trust with identity-based application access. ZTNA verifies user, device, and policy on every connection rather than granting network-level access. Microsegmentation contains lateral movement east-west once an intrusion lands. Secure web access (SWG, DNS filtering) enforces policy on outbound traffic.
- ZTNA$5-$20 / user / monthIdentity-based application access. Replaces or supplements VPN. Standard tier ZTNA covers web apps; advanced tier adds RDP/SSH and full app segmentation.
- Microsegmentation$20K-$60K / yr flat (mid-market)East-west traffic control. Agent-based (Illumio, Akamai Guardicore) or fabric-based (Cisco ACI, VMware NSX). Cost rises sharply at enterprise scale.
- Secure web gateway$3-$8 / user / monthOutbound traffic policy, malware scanning, URL filtering. Often bundled with ZTNA in SASE platforms.
- DNS filtering$1-$3 / user / monthQuick-win zero trust control. Cisco Umbrella, Cloudflare Gateway, Quad9. Can be deployed in days.
ZTNA: Cloudflare Zero Trust, Twingate, NordLayer, Microsoft Entra Private Access, major SASE platforms. Microsegmentation: Illumio, Akamai Guardicore, VMware. SASE platforms combine ZTNA + SWG + CASB.
- Microsegmentation as Phase 1. The most common over-spend: deploying microsegmentation before identity and device pillars are mature. Microsegmentation depends on accurate identity context, deploying it first means re-doing policy work later.
- Replacing VPN entirely on day one. ZTNA migrations should run in parallel with VPN for 60-180 days while users transition. Skipping the parallel phase causes outages and rollbacks.
- Buying SASE for a small ZTNA need. SASE platforms ($15-$25/user/month) bundle SWG, CASB, FWaaS, and ZTNA. If you only need ZTNA and have separate SWG/CASB, a focused ZTNA platform ($5-$10/user/month) is dramatically cheaper.
Workload
10-15% of budgetCloud workloads, containers, and APIs are the modern zero trust attack surface. CSPM scans cloud configuration for drift. Container runtime security catches malicious behaviour in Kubernetes. API security enforces policy on internal and external APIs. Service mesh provides identity-aware service-to-service traffic control.
- CSPM$5-$15 / workload / monthCloud configuration scanning, compliance posture (CIS, NIST, PCI), drift detection across AWS / Azure / GCP.
- Container security$8-$20 / node / monthImage scanning, runtime detection, admission control. Kubernetes-native options available open-source.
- API security$15K-$50K / yr baseDiscovery, schema enforcement, rate limiting, abuse detection. Cost rises with API volume.
- Service meshOpen-source Istio or commercial $20K+ / yrIdentity-aware service-to-service traffic, mTLS, fine-grained policy. Optional but increasingly common in cloud-native estates.
Wiz, Palo Alto Prisma Cloud, Aqua Security, Sysdig, Lacework, Snyk. Open-source: Falco, OPA, Trivy, Istio.
- CSPM agent sprawl. Buying separate point tools for posture, runtime, and IaC scanning when modern CNAPP platforms (Wiz, Prisma Cloud) consolidate them. Audit overlap before adding the third tool.
- Underestimating container scale. Per-node pricing assumes long-lived nodes; ephemeral nodes in autoscaling clusters can multiply licensed-node count by 3-5x.
- Ignoring identities for workloads. Service-to-service authentication via short-lived tokens (workload identity, mTLS) is a Phase 2 zero trust requirement that vendors often skip.
Data
10-15% of budgetThe pillar most organisations defer to Phase 3. Classification labels data by sensitivity. DLP enforces handling rules. Encryption protects data at rest and in transit. CASB controls third-party SaaS data flow. Done well, the data pillar stops sensitive material leaving the perimeter; done poorly, it generates alert fatigue and user frustration.
- CASB / SaaS DLP$8-$18 / user / monthSaaS visibility, sanctioned vs unsanctioned app discovery, data flow controls. Often bundled with SASE.
- Endpoint DLP$3-$8 / user / monthLocal data movement controls (USB, clipboard, print, upload). Performance impact is real, tune carefully.
- Data classification$8K-$35K / yr baseAuto-labelling on file create / save based on content. Microsoft Purview, Varonis, BigID. Manual classification is unsustainable beyond a few thousand files.
- Encryption (at-rest, in-transit)Mostly includedCloud platforms include at-rest encryption by default. Customer-managed keys (CMK) add modest cost. Bring-your-own-key adds compliance value.
CASB: Netskope, Microsoft Defender for Cloud Apps, Forcepoint, Skyhigh. Classification: Microsoft Purview, Varonis, BigID, Spirion. DLP often part of CASB or endpoint security suite.
- Auto-classification without business review. Auto-labels need to map to business categories and handling policies. Without a six-month classification review cycle, false-positive labels generate user friction and policy bypass.
- Endpoint DLP too aggressive on day one. Block-mode DLP on day one breaks legitimate workflows. Run in monitor-mode for 60-90 days, tune policies, then move to enforce.
- Treating encryption as a checkbox. Encryption matters for breach-disclosure exemptions and compliance. Customer-managed keys with proper key rotation procedure are non-trivial work, allocate budget for the operational overhead, not just licence cost.
Estimate your pillar split
The full cost calculator applies pillar weightings to your inputs and produces a personalised allocation. Use it together with this page to validate the split for your specific maturity target.
Open calculator ->