Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
Data pillar

Data pillar cost: DLP, classification, encryption and tokenisation

The data pillar of zero trust applies controls to the data itself: classification, encryption, loss prevention, tokenisation, and access policies that travel with the data. This page breaks down each sub-component's cost, sizes the pillar by organisation, explains why most programmes defer it to Phase 3, and answers the regulated-industry questions that change the budget profile sharply.

What's in the pillar

Data pillar in CISA terms

The CISA Zero Trust Maturity Model v2.0 defines the data pillar across five capability areas: data inventory management, data categorisation, data availability, data access (the decision itself), and data encryption. The principle is straightforward: even after a perimeter compromise, the data itself must remain protected through encryption, labelling, and policies that travel with the data. NIST SP 800-207 frames the data resource as the ultimate object of zero trust protection; every other control exists to defend access to it.

The pillar has seven cost-bearing components in practice. Data classification assigns sensitivity labels to information so that downstream controls can enforce policy. Data loss prevention monitors and blocks unauthorised exfiltration across email, web, endpoint and cloud. Encryption at rest and in transit are baseline expectations included in every modern platform at zero marginal cost. Confidential computing extends encryption to data in use via hardware-backed memory encryption. Tokenisation replaces sensitive data with non-sensitive substitutes for scope reduction. Data discovery and DSPM (data security posture management) catalogues data across cloud stores to keep the inventory current. Key management handles the cryptographic keys that everything else depends on.

The pillar is the most often deferred for a structural reason: every data control is more effective when the earlier pillars are mature. DLP without identity context catches obvious exfiltration but misses sophisticated attacks. Classification without a clean data inventory produces labels that do not match reality. Tokenisation without application refactoring is half-effective at best. CISA frames data as the fifth and most aspirational pillar in the maturity model for this reason, and the budget allocation reflects it: 10 to 15 percent of total zero trust spend in most estates, with the share rising in regulated industries.

Component pricing

Cost by data sub-component

Per-user per-month and per-platform pricing for the seven data components. Pricing is market-typical; Microsoft-bundled paths land at the lower end across most components for M365 E5 customers.

ComponentList price rangeSized onNotes
DLP (cloud-native)$5 - $15 / user / monthWorkforce with data accessEmail, web, endpoint, cloud-app DLP. Microsoft Purview included in M365 E5. Standalone from Symantec, Forcepoint, Netskope.
Data classification$5 - $12 / user / monthWorkforce creating or handling sensitive dataMicrosoft Purview Information Protection bundled in E5. Standalone Boldon James, Titus, Fortra for heterogeneous estates.
Encryption at rest / in transit$0 marginalAll dataBundled into every modern platform. Baseline expectation, not a budget line item.
Confidential computing15-35% premium on cloud billWorkloads processing sensitive data in memoryAzure Confidential Computing, AWS Nitro Enclaves, GCP Confidential VMs. Plus engineering effort to refactor apps.
Tokenisation$30K - $300K / year + per-txnSystems handling PAN, SSN, account numbersThales CipherTrust, Protegrity, Very Good Security. Required for PCI-DSS scope reduction.
Data discovery / DSPM$40K - $500K / yearCloud data storesData security posture management. Sentra, Cyera, Dig Security, Microsoft Purview Data Map. Newer category.
Key management (KMS / HSM)$1K - $30K+ / yearEncryption-using workloadsCloud-native KMS at the low end. Dedicated HSM for high-assurance or regulatory environments.
Sizing

Data pillar cost by organisation size

OrganisationWorkforceYear 1 licenseYear 1 totalOngoing / yearNotes
SMB100 users$10K - $30K$20K - $60K$15K - $40KMicrosoft Purview within Business Premium covers most. Data pillar usually scoped down for SMB.
Mid-market500 users$40K - $120K$80K - $250K$60K - $160KAdd classification, DLP coverage extension, basic data discovery.
Enterprise2,000 users$150K - $400K$320K - $850K$220K - $580KFull DLP, full classification, DSPM, tokenisation if regulated, KMS / HSM.
Large enterprise10,000+ users$500K - $1.4M$1.0M - $2.8M$700K - $1.8MMulti-vendor, multi-platform. Regulatory variation drives upper bound (financial, healthcare, federal contractor).
Regulated industries

When the data pillar share rises sharply

Three industries see the data-pillar share of zero trust budget rise from the 10 to 15 percent base toward 20 to 25 percent or more. Financial services have explicit data protection mandates under SEC cybersecurity rules, GLBA, and various state-level frameworks (NYDFS Part 500 is the canonical example), plus PCI-DSS for any payment-card handling. Tokenisation, encryption-key management with dedicated HSMs, and comprehensive DLP across customer-data flows are not optional. Healthcare operates under HIPAA, which requires technical safeguards including access controls, audit controls, integrity controls, and encryption for protected health information. The data-pillar buildout for a HIPAA-covered entity is materially more extensive than for a non-regulated equivalent. Federal contractors and government operate under FedRAMP, CMMC, and various DoD-specific frameworks; CMMC Level 2 and above require demonstrable data classification, labelling and DLP controls.

The cost uplift in regulated industries comes from three places. Audit-grade key management with dedicated hardware security modules adds $30K to $200K per year per HSM compared to cloud-native KMS. Comprehensive classification and labelling becomes mandatory rather than optional, which means deploying classification tooling to the full workforce rather than a risk-tier subset. And DLP coverage extends to every channel (email, web, endpoint, cloud, removable media) rather than just the high-traffic channels, which typically doubles the DLP licensing cost.

For PCI-DSS specifically, tokenisation is the highest-value data-pillar investment. Tokenising primary account numbers can remove systems from PCI scope entirely, which eliminates ongoing audit, scanning and assessment costs on those systems. For a mid-sized merchant, scope reduction can save $100K to $400K per year in audit and compliance cost, more than offsetting tokenisation platform cost in the first year. The sister site pcicompliancecost.com has a deeper breakdown of PCI scope-reduction economics.

Sequencing

Why data is Phase 3, and what data work to start earlier

Most data-pillar capabilities are most effective when deployed after the identity, device and network pillars are mature. Identity context lets DLP make policy decisions based on who the user is and what risk tier they sit in, not just what data is moving. Device posture lets DLP decide whether to allow exfiltration to a fully managed endpoint versus a personal device. Network context lets DLP correlate exfiltration attempts with known-risky destinations. Without those inputs, DLP is largely pattern-matching plus IP-based filtering, which catches obvious exfiltration but misses sophisticated attacks.

That said, two pieces of data work should start in Phase 1, alongside identity and device. Data inventory (knowing where the data actually lives) is the prerequisite for every later data control and benefits from being started early because inventories take time to build accurately. Baseline encryption across cloud workloads, databases and storage should be turned on day one because it costs essentially nothing and removes a class of audit findings immediately. The remaining data controls (classification rollout, DLP policy authoring, tokenisation, DSPM, confidential computing) benefit from the wait.

ROI

What the data pillar buys you

The data pillar produces the most directly attributable risk-reduction value in zero trust because the data itself is the ultimate target. The IBM 2024 Cost of a Data Breach report found that the dominant cost component in a data breach is the value of the records exposed (lost business, customer notification, regulatory fines), all of which the data pillar directly affects. Encryption and tokenisation, if applied to the exposed data before the breach, materially reduce the records-exposed cost component. DLP, if it catches the exfiltration in progress, can reduce or eliminate the breach itself.

The per-pillar ROI calculation is harder for data than for identity because the value depends on which breach scenarios occur. A breach involving credential abuse without data exfiltration produces no data-pillar value. A breach involving large-scale exfiltration of customer records produces enormous data-pillar value (if the records were tokenised or encrypted in ways the attacker cannot reverse). For regulated industries the data pillar pays back faster because regulatory fine exposure adds to the breach-cost reduction. For non-regulated industries the pillar still pays back, but on a longer time horizon and with more variance.

Cross-links

Related cost references

Frequently asked

Data pillar cost questions

What is the data pillar of zero trust?
The data pillar covers the controls applied to data itself rather than the systems that hold it. Per the CISA Zero Trust Maturity Model v2.0 it spans data inventory, data classification, data labelling and tagging, encryption (at rest, in transit and increasingly in use), data loss prevention, and access controls applied at the data layer. The principle is that even after a perimeter compromise, the data itself remains protected through encryption, labelling, and access policies that travel with the data. Budget share is 10 to 15 percent of total zero trust spend and is the pillar most often deferred to Phase 3.
How much does DLP cost?
DLP pricing varies by deployment model. Microsoft Purview DLP is included in Microsoft 365 E5 at no additional marginal cost, which is the cheapest entry point for Microsoft-centric estates. Standalone DLP from Symantec, Forcepoint, Trellix and Proofpoint runs roughly $5 to $15 per user per month depending on coverage (email-only at the low end, full multi-channel at the high end). Network DLP appliances add $30K to $300K in hardware plus $10K to $60K per year in maintenance. Cloud-native DLP (Netskope, Skyhigh Security, Microsoft Defender for Cloud Apps) is per-user per-month and scales linearly.
Do we need a separate data-classification tool?
For most organisations, the data-classification capability bundled into Microsoft Purview Information Protection is sufficient for the data pillar. Standalone classification tools (Boldon James, Titus, Fortra Classifier) make sense if you have heterogeneous file estates that span Microsoft 365 and non-Microsoft systems, or if you have very specific labelling taxonomies that need finer control than Purview offers. The cost difference is meaningful: standalone classification runs $5 to $12 per user per month on top of existing licensing, while Purview is roughly $5 to $7 per user per month for the full Information Protection suite within an E5 estate.
What is the difference between encryption at rest, in transit, and in use?
Encryption at rest protects data on disk; every modern cloud provider offers it by default at no marginal cost and most regulatory frameworks (GDPR, HIPAA, PCI-DSS) treat it as a baseline expectation. Encryption in transit protects data on the wire using TLS; also essentially free and a baseline expectation. Encryption in use is the harder problem: protecting data while it is being processed in memory by an application. Confidential computing platforms (Microsoft Azure Confidential Computing, AWS Nitro Enclaves, Google Confidential VMs) provide hardware-backed memory encryption. Premium for confidential compute over standard VMs is typically 15 to 35 percent at the cloud bill, plus engineering work to refactor applications to use it.
What about tokenisation?
Tokenisation replaces sensitive data (typically payment card numbers, account numbers, national identifiers) with a non-sensitive substitute that has no exploitable value. It is the dominant control for PCI-DSS scope reduction and is required for any system that handles primary account numbers. Cost runs $30K to $300K per year for platform plus per-transaction fees on processing volume. Vendors include Thales CipherTrust Tokenization, Protegrity, and the tokenisation services built into major payment processors. For PCI-DSS scope reduction, tokenisation can pay back rapidly: removing systems from PCI scope eliminates audit cost on those systems, which can offset tokenisation cost in the first year for mid-sized merchants.
Why is the data pillar usually deferred to Phase 3?
Because it depends on foundations the earlier pillars build. DLP without identity context is largely IP-based filtering, which catches obvious exfiltration but misses anything sophisticated. Classification without a clean data inventory produces labels that do not match reality. Tokenisation without application refactoring is half-effective at best. Each data control is more effective when the identity, device, network, and applications pillars are mature underneath it. CISA frames data as the fifth and most aspirational pillar in the maturity model for this reason. Most programmes that try to deploy data controls in Phase 1 spend twice as much for half the value compared to deploying them in Phase 3.
How much does the data pillar cost for a 500-user organisation?
Year-one data-pillar cost for a 500-user mid-market organisation is roughly $80K to $250K including DLP, classification, and basic tokenisation if PCI-DSS applies. Ongoing annual cost is roughly $60K to $160K. The Microsoft-bundled path (Purview within E5) lands at the lower end. A best-of-breed multi-vendor path with standalone DLP, standalone classification, and a tokenisation platform lands at the upper end. For regulated industries (financial services, healthcare, payments) the data-pillar share rises from the 10 to 15 percent base to 15 to 25 percent of total ZT spend.