Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
Identity pillar

Identity pillar cost: SSO, MFA, PAM and governance pricing

Identity is the foundation of zero trust and consumes 30 to 40 percent of total programme budget. This page breaks down the cost of every identity sub-component, sizes the pillar by organisation size, lists the four most expensive design mistakes, and answers the legacy-app and service-account questions every CISO eventually faces.

What's in the pillar

The identity pillar in NIST and CISA terms

The NIST SP 800-207 zero trust architecture defines identity as one of three primary inputs to the Policy Engine, alongside device posture and asset state. Identity in that spec includes the user identity itself, the authentication strength, the session context, and any behavioural risk signals attached to the user. The CISA Zero Trust Maturity Model v2.0 (April 2023 final) formalises identity as the first of five pillars and grades it across four maturity tiers from Traditional through Initial, Advanced, and Optimal. The Optimal tier requires phishing-resistant MFA on every authentication and continuous risk evaluation rather than point-in-time access decisions.

In budget terms, identity consistently lands at 30 to 40 percent of total zero trust spend. The reason it dominates is structural: every other pillar depends on identity to make a meaningful access decision. A microsegmentation control without identity context is just IP-based firewalling under a new name. A device-trust signal without identity context cannot authorise the user behind the device. A data-classification rule cannot enforce role-based access without an identity to evaluate against. Under-investing in identity in Phase 1 makes every later pillar more expensive and less effective.

The pillar has seven cost-bearing components in practice. Single sign-on consolidates application access behind one identity provider. Multi-factor authentication proves possession of a second factor (a device, a hardware key, or in modern variants a phishing-resistant cryptographic challenge). Conditional access evaluates risk and context to decide whether to allow, challenge, or deny each request. Privileged access management contains the blast radius of compromised privileged accounts. Identity governance ensures access stays correct over time through reviews and attestations. Identity-aware proxies extend modern identity to legacy applications that cannot speak SAML or OIDC.Machine and workload identity applies the same access discipline to service accounts, APIs, and workload-to-workload calls. The seven components have wildly different price points and adoption sequences.

Component pricing

Cost by identity sub-component

Per-user per-month pricing for the seven identity components that drive zero trust spend. Pricing is market-typical from vendor public materials and aggregated negotiated-deal data; expect 15-35 percent discount at multi-year enterprise term.

ComponentList price rangeSized onNotes
SSO with basic MFA$3 - $7 / user / monthAll workforce usersOften bundled into M365 or Google Workspace at low marginal cost.
Advanced identity (P2 tier)$6 - $12 / user / monthAll workforce, or risk-tier subsetRisk-based MFA, identity protection signals, PIM (just-in-time admin).
PAM$15 - $40 / privileged user / monthPrivileged users only (10-15% of workforce typical)Privileged session recording, secrets vault, just-in-time elevation. Sized on privileged count, not total.
Identity governance (IGA)$7 - $20 / user / monthWorkforce within audit scopeAccess reviews, entitlement management, lifecycle automation, attestations.
FIDO2 hardware keys$25 - $50 / user one-timePrivileged accounts, federal contractors, optionally allPhishing-resistant MFA hardware. Required under OMB M-22-09 for federal.
Identity-aware proxy$5 - $10 / user / monthUsers accessing legacy appsFronts apps that don't speak SAML or OIDC. Cloudflare Access, Entra App Proxy, Google IAP.
Machine / workload identityVariable, often per-secret or per-API callService accounts, workloads, APIsSecrets vault, SPIFFE/SPIRE, mTLS infrastructure. Easy to underestimate.
Sizing

Identity pillar cost by organisation size

Year-one license, year-one total (including implementation), and steady-state ongoing annual cost. The total-cost gap between license and total is the professional-services and integration cost most CISOs underestimate.

OrganisationWorkforceYear 1 licenseYear 1 totalOngoing / yearNotes
SMB100 users$30K - $80K$60K - $140K$40K - $90KMicrosoft-bundled path lands at the lower end. Standalone identity vendor at the upper.
Mid-market500 users$120K - $260K$280K - $520K$160K - $320KAdd PAM rollout in year one. Identity governance typically deferred to year two.
Enterprise2,000 users$400K - $900K$1.0M - $2.4M$650K - $1.4MFull stack: SSO, advanced identity, PAM, IGA, machine identity, lifecycle automation.
Large enterprise10,000+ users$1.5M - $4.0M$4.0M - $11.0M$2.5M - $6.0MPer-user licensing flattens (volume discount), but implementation cost scales with complexity.
Sequencing

What to deploy in what order, and what each phase costs

Identity has a strict ordering for zero trust that experienced CISOs converge on. Skipping the sequence is the most expensive identity mistake. The order is: SSO consolidation, MFA on privileged accounts, MFA universal, then PAM, then IGA, then machine identity and legacy-app extension. Each step has a distinct cost profile and adoption pattern.

Step 1: SSO consolidation. Cost: $40K to $200K depending on application count. Timeline: 60 to 180 days. The most common SSO migration is fifteen to forty SaaS applications federated to a single IdP, with the line-of-business application owner doing the SAML or OIDC setup with vendor support from the IdP team. The cost is mostly internal engineering time, not licensing. The risk is that some applications charge an SSO surcharge (the so-called "SSO tax") that can add $5K to $25K per year per application. Audit application contracts before assuming SSO migration is free.

Step 2: MFA on privileged accounts. Cost: $5K to $40K, mostly hardware-key procurement and admin training. Timeline: 30 to 60 days. This is the highest-leverage zero trust control measured against cost. Microsoft published analysis in 2022 showing that MFA blocks more than 99.9 percent of automated identity attacks. Phishing-resistant MFA (FIDO2 hardware keys, passkeys, or Windows Hello for Business) blocks the residual 0.1 percent that adversary-in-the-middle phishing tools like Evilginx defeat. For privileged accounts (admins, finance, executive), phishing-resistant MFA is no longer optional in any zero trust framework.

Step 3: MFA universal. Cost: $80K to $400K for a 500-user organisation, including per-user identity license uplift and end-user training. Timeline: 90 to 180 days. The training cost is real: every help-desk team reports a spike in MFA tickets in the first eight weeks after rollout, which subsides as user fluency builds. Plan for a 30 to 50 percent ticket volume increase during the rollout window.

Step 4: PAM. Cost: $200K to $800K year-one for a mid-market deployment, including license, implementation, and privileged-account inventory work. Timeline: 60 to 180 days. PAM cost is dominated by professional services in year one, then by per-privileged-user license in years two and onward. Discovery of the privileged-account population is the most common cost overrun: most organisations find 30 to 60 percent more privileged accounts than they initially scoped.

Step 5: IGA. Cost: $150K to $600K year-one for a 500-user organisation. Timeline: 90 to 240 days. Identity governance benefits massively from being deployed onto a stable identity foundation. Without universal MFA and a clean SSO inventory underneath, IGA produces certificate-rich reports against weak underlying enforcement, which is theatre rather than governance.

Step 6: Machine and workload identity. Cost: variable, typically $100K to $500K per year for tooling plus a six to eighteen month engineering programme to rotate service-account credentials into short-lived tokens. Timeline: 12 to 36 months. This is the longest single workstream in identity zero trust and is routinely the gap that prevents organisations from reaching CISA Optimal-tier maturity.

Over-spend traps

Four ways to waste identity-pillar budget

These are the four identity-pillar over-spends that recur across mid-market and enterprise programmes.

Trap

Buying PAM before stabilising basic MFA

$200K - $800K wasted

PAM rollouts depend on accurate privileged-account inventory and stable authentication. Without universal MFA first, PAM session recordings are weakened and policy authoring is incomplete. The sequence that consistently works: SSO consolidation, MFA on privileged accounts, MFA universal, then PAM.

Trap

Skipping joiner / mover / leaver automation

$80K - $300K annually in manual ops

Manual lifecycle workflows cost roughly $400 - $1,200 per joiner / mover / leaver event when fully loaded with help desk, IT admin, manager attestation and audit-trail labour. For a 500-user organisation with 25 percent annual turnover, that is $50K - $150K per year, every year.

Trap

Treating service accounts as out of scope

Variable but high under breach scenario

Service accounts with static credentials are the single most common lateral-movement vector in incident-response cases. Verizon's 2024 DBIR found stolen credentials in 38 percent of breaches. Service accounts not under identity governance are typically the longest-lived stolen credential.

Trap

Buying identity governance before universal MFA

$150K - $500K in deferred value

IGA platforms produce certificate-rich reports, but if the underlying access enforcement is weak, the reports are theatre. Sequence: enforce access first (SSO, conditional access, MFA), then certify it (IGA).

Hard case

Identity zero trust for legacy apps and service accounts

The two questions every CISO faces once basic identity is in place. These are also the two queries our search-console data shows users genuinely searching for, in long verbatim form.

The hard case in identity zero trust is the long tail of applications and accounts that do not fit the modern identity pattern. Legacy applications often use form-based authentication or proprietary protocols and cannot speak SAML or OIDC. Service accounts authenticate with static long-lived credentials that cannot perform MFA. Both are excluded from the obvious zero trust controls, and both are routinely the highest-risk population in an environment. Verizon's 2024 Data Breach Investigations Report found that 38 percent of breaches involve the use of stolen credentials, with service-account credentials and legacy-app credentials disproportionately represented in the lateral-movement phase.

For legacy applications, three patterns work. Identity-aware proxy places a reverse proxy in front of the app that handles authentication before traffic reaches the legacy back-end. Microsoft Entra Application Proxy, Google Identity-Aware Proxy and Cloudflare Access all do this. Cost: roughly $5 to $10 per user per month for users accessing the legacy app, plus a small per-app deployment effort (one to three days of engineering per app). Legacy modernisation rewrites or wraps the legacy app to speak modern identity protocols. This is the cleanest long-term answer but the highest-cost short-term path; budget for $50K to $500K per legacy app depending on its complexity. Compensating network controls wraps the legacy app in microsegmentation and ZTNA so that only authenticated identity-aware traffic ever reaches it, accepting that the app itself remains identity-blind. The compensating-control path is the cheapest in year one but the weakest in audit posture.

For service accounts, the dominant pattern is migration to short-lived tokens issued from a secrets vault. HashiCorp Vault, AWS Secrets Manager, Azure Key Vault and CyberArk Conjur all offer this. The cost is mostly engineering time, not licensing: every service account is a discrete migration task with its own owner, its own consuming applications, and its own credential-rotation gotchas. A typical mid-market environment has 200 to 600 service accounts; allocating two to four hours of engineering per account works out to roughly 400 to 2,400 hours of effort, or $80K to $400K loaded. That is the budget line that does not appear on the licensing quote.

Mature programmes use all three approaches in combination: identity-aware proxy for the simple legacy apps, modernisation for the strategic ones, compensating controls for the doomed ones, plus a secrets-vault rollout for service accounts. Sequencing matters here too: do the secrets vault rollout in parallel with universal MFA in Step 3 above, not as a separate Phase 3 workstream, because the two share most of the same engineering team and benefit from the same change-management runway.

ROI

What the identity pillar buys you in risk-reduction terms

The identity pillar produces the single largest risk-reduction effect in zero trust on a dollar-of-spend basis. The IBM 2024 Cost of a Data Breach report found that organisations with mature identity-and-access management controls paid $1.51 million less per breach on average and contained incidents 28 days faster than peers. The dominant initial-access vector in 2024 breaches was credential compromise, which MFA addresses directly. Phishing was the second most common initial-access vector, which phishing-resistant MFA addresses where regular MFA falls short.

A useful back-of-envelope: for a mid-market organisation with a 2 to 4 percent annual breach probability, the expected breach-cost reduction from mature identity controls is $30K to $60K per year. Set against a year-one identity-pillar cost of $280K to $520K and ongoing of $160K to $320K, the identity pillar pays back in two to four years against breach risk alone. The other benefits (productivity from SSO, help-desk reduction from self-service password reset, audit posture from IGA) are real but harder to quantify.

Cross-links

Related cost references

Adjacent pages on this site and sister Digital Signet references for the controls identity depends on.

Frequently asked

Identity pillar cost questions

What is the identity pillar of zero trust?
In the CISA Zero Trust Maturity Model v2.0, identity is the first of five pillars and the foundation of every other control. It covers how users (and non-human principals like service accounts, workloads and APIs) are authenticated, authorised, and continuously verified. The components are single sign-on, multi-factor authentication (with phishing-resistant variants for higher tiers), privileged access management, identity governance, and machine identity. NIST SP 800-207 frames identity as one input to the Policy Engine, alongside device posture, behaviour, and asset state. In budget terms, identity is typically 30 to 40 percent of total zero trust spend across all org sizes.
How much does the identity pillar cost per user?
Per-user per-month identity costs add up across components. Basic SSO with conditional access runs three to seven dollars per user. Advanced identity (risk-based MFA, identity protection, just-in-time admin) adds six to twelve dollars. Privileged access management runs fifteen to forty dollars per privileged user (not per total workforce). Identity governance adds seven to twenty dollars per user. FIDO2 hardware keys are a one-time twenty-five to fifty dollars per user. A full mid-market identity stack lands at twelve to thirty dollars per user per month for the general workforce, with PAM concentrated on the few hundred privileged accounts.
What is the cheapest credible identity stack for zero trust?
For Microsoft 365 customers, the entry-level zero-trust identity stack is Microsoft 365 Business Premium or E3 with Entra ID P1 plus Defender for Identity. Entra P1 includes conditional access, MFA, and group-based access control. For a 100-user organisation that path is roughly twenty-two dollars per user per month including productivity, which covers identity, basic device, and basic data pillars in a single bundle. For non-Microsoft estates, Okta Workforce Identity Starter or Google Workspace with Cloud Identity Premium are comparable entry points. Below this tier, you can do conditional MFA with free tools, but you will not pass a SOC 2 or ISO 27001 audit on the strength of free tooling alone.
How much does PAM cost?
Privileged access management is the most expensive identity component on a per-user basis but the per-user count is small. List pricing for CyberArk, BeyondTrust and Delinea is roughly fifteen to forty dollars per privileged user per month, with self-hosted variants at the lower end and SaaS variants at the upper end. The list rarely matches negotiated price for enterprise deals; expect twenty to forty percent discount at three-year terms above two hundred privileged users. Implementation cost is heavy: a typical mid-market PAM rollout is sixty to one hundred and eighty days of professional services and accounts for fifty to seventy percent of year-one PAM cost.
Do we really need identity governance if we have SSO and MFA?
Yes, eventually. SSO and MFA solve the authentication problem. Identity governance solves the authorisation drift problem: who actually has access to what, and is that access still appropriate. Without quarterly access reviews and entitlement management, an SSO and MFA investment degrades within eighteen to twenty-four months as access drift accumulates from joiners, movers, leavers and one-off project access grants. SOC 2 and ISO 27001 audit findings on access reviews are the most common audit non-conformance in the cohort. You can defer governance from Phase 1 to Phase 2 of a zero trust rollout, but you cannot defer it indefinitely without losing audit posture.
How do we extend MFA to legacy applications and service accounts?
This is the hardest identity problem in zero trust because the dominant pattern is applications that do not support SAML, OIDC or modern protocols, and service accounts that authenticate with static long-lived credentials. Three approaches: front the legacy app with an identity-aware proxy (Cloudflare Access, Microsoft Entra Application Proxy, Google IAP) that handles authentication before traffic reaches the app, which costs roughly five to ten dollars per user per month plus a small per-app deployment effort; rotate static service-account credentials into a secrets vault (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, CyberArk) and switch service-to-service calls to short-lived tokens, which is a six to eighteen month engineering programme; or accept the residual risk and compensate with stronger network controls (microsegmentation, ZTNA) around the legacy app. In practice, mature programmes use all three.
What is the hidden cost of the identity pillar?
Lifecycle automation. Joiner, mover, leaver flows touch HR systems, ITSM, every connected application, and every privileged-access workflow. Building these flows correctly is roughly thirty to fifty percent of identity-pillar professional services cost and is routinely under-budgeted. The other hidden cost is integration with legacy applications that do not support SAML or OIDC, which requires either an identity-aware proxy or per-application custom work. Both of these costs sit on top of licensing and are easily as large as licensing in year one.