Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
Build vs buy

In-house versus vendor zero trust cost: when each wins

Every CISO asks once whether the organisation could just build zero trust in-house with open source. This page is the honest answer. The open-source components exist for every pillar; total cost of ownership rarely favours in-house under 5,000 users; sovereignty is the strongest in-house argument; and a hybrid approach (commercial for differentiated pillars, open source for the rest) is the dominant pattern in 2026.

Components by pillar

What open source covers, and what it doesn't

Per-pillar comparison of commercial and open-source options, with the verdict on which typically wins at mid-market scale. The verdict assumes a 500 to 2,000-user organisation without existing deep open-source expertise; specifics shift in either direction at larger scale or with different starting positions.

PillarCommercialCostOpen sourceOSS costVerdict
IdentityEntra ID P1 / Okta WIA / Ping$6 - $15 / user / monthKeycloak, Authentik, Zitadel$100K - $260K / yr (ops) for 500 usersCommercial wins under 5,000 users
Network (ZTNA)Cloudflare, Zscaler, Palo Alto$5 - $20 / user / monthOpenZiti, Pomerium, Boundary$60K - $180K / yr (ops)Commercial wins under 2,000 users
Device (EDR)Defender, CrowdStrike, SentinelOne$3 - $15 / endpoint / monthWazuh, osquery$80K - $200K / yr (ops)Commercial wins almost always; EDR is hard to build well
Applications (workload identity)Commercial SPIFFE / service mesh$50K - $300K / yrSPIFFE / SPIRE, Istio, Linkerd$80K - $250K / yr (ops)Open source competitive; many mature programmes use OSS here
Data (DLP)Symantec, Forcepoint, Purview$5 - $15 / user / monthLimited; gap in OSS coverageEffectively not feasible at scaleCommercial mandatory; OSS gap is real
Policy EngineBundled into IdP / ZTNAIncludedOpen Policy Agent (OPA)$40K - $120K / yr (ops)Open source genuinely competitive; OPA is widely adopted
Secrets vaultCyberArk Conjur, AWS Secrets Manager$30K - $400K / yr + usageHashiCorp Vault OSS, SOPS$60K - $150K / yr (ops)Open source competitive at mid-market scale
SIEMSplunk, Sentinel, Chronicle$50K - $500K+ / yrWazuh, Graylog, OpenSearch$120K - $400K / yr (ops + infra)Commercial wins under 10,000 events / sec; OSS competitive above
The honest in-house TCO

What in-house zero trust actually costs at mid-market scale

A 500-user organisation running a full open-source zero trust stack needs roughly 2 to 3 dedicated platform engineers to keep the stack running. The work involves upgrade management (every component has its own release cadence and breaking changes), integration testing (every component needs to keep working with every other component as versions change), CVE response (you patch, not the vendor), capacity planning, log retention infrastructure management, and the long tail of operational debugging when something breaks at 2am. The 2 to 3 FTE estimate is consistent across mid-market in-house zero trust stacks; some claim lower headcount with heroic individual engineers, but those stacks tend not to survive the engineer leaving the organisation.

At fully-loaded cost (salary plus benefits plus tooling plus management overhead), 2 to 3 platform engineers run $300K to $600K per year. Add infrastructure: production-grade deployments of Keycloak, Vault, OpenZiti, Wazuh and supporting services typically run $40K to $120K per year on cloud infrastructure for a 500-user equivalent capacity. Total open-source TCO at 500 users: $340K to $720K per year. Compare with commercial: identity at Entra P1 ($36K), basic ZTNA ($60K), EDR via Defender ($30K incremental over E5), SIEM via Sentinel ($150K), secrets vault commercial ($80K), totalling roughly $356K to $700K for equivalent coverage. The numbers are close enough that the deciding factor is team composition, not nominal price.

The crossover where in-house starts to materially win on cost is roughly 5,000 users for most pillars and 10,000 users for the full stack. At 10,000 users, commercial per-user licensing across the full zero trust stack runs $2M to $4M per year, while in-house operational TCO scales sub-linearly (the engineering team grows slower than the user count). For organisations of this scale that also have existing platform-engineering capability, in-house can save $500K to $1.5M annually in steady state. For smaller organisations the saving rarely materialises.

Hybrid pattern

The dominant pattern in 2026: commercial for some pillars, open source for others

Most mid-market organisations adopting zero trust in 2026 do not choose pure commercial or pure open source. They adopt a hybrid pattern: commercial for the pillars where vendor differentiation is high and the operational cost of self-hosting is steep, open source for the pillars where vendor differentiation is low and the operational cost is manageable.

The dominant hybrid configuration: commercial for identity (vendor differentiation is high, identity is the deepest integration in the stack, switching cost is severe), commercial for ZTNA (operational complexity of self-hosted ZTNA is significant, vendor SLAs matter for user-facing traffic), and commercial for EDR (detection efficacy is highly vendor-differentiated, open-source EDR like Wazuh is workable but operationally heavy). Open source forworkload identity via SPIFFE / SPIRE (mature open source, commercial differentiation low), open source forPolicy Engine via Open Policy Agent (OPA is the de facto standard regardless of commercial wrapping), and open source for secrets vault via HashiCorp Vault OSS or Mozilla SOPS for non-customer-facing services.

The hybrid pattern typically lands at 60 to 80 percent of pure-commercial total cost, with the saving concentrated in workload-identity and secrets-management infrastructure. Operational overhead: roughly 0.5 to 1 platform engineer dedicated to the open-source pieces, versus the 2 to 3 required for full in-house. The pattern is robust to engineer turnover (commercial vendors handle the most-critical pillars) and scales well with org growth (the open-source pieces are at the edges, not the foundation).

When in-house genuinely wins

Three scenarios where build beats buy

Scenario 1: Very large organisations. Above 10,000 users, commercial per-user licensing becomes a material budget item. A 25,000-user organisation paying $20 per user per month for full zero trust commercial licensing is spending $6M per year on licensing alone. In-house at this scale needs perhaps 5 to 8 platform engineers ($750K to $1.6M loaded) plus $200K to $500K in infrastructure, totalling $1M to $2.1M per year. The saving is $4M to $5M per year, which justifies the in-house operational investment. Most very large organisations either have this capability or build it.

Scenario 2: Deep existing open-source expertise. Organisations with platform-engineering teams already maintaining open-source identity, networking and security infrastructure can absorb additional open-source zero trust components without adding much headcount. The marginal cost of one more open-source component is much lower than the standalone cost. This is the pattern in some tech-forward mid-market organisations and most public-cloud-native enterprises with deep platform teams.

Scenario 3: Sovereignty constraints. Organisations that cannot use commercial cloud-delivered platforms due to data-residency, regulatory, or sovereignty requirements have no commercial choice and must build in-house. EU public-sector with strict data-residency requirements, defence and intelligence contractors with classified environments, and some critical national infrastructure operators fall in this category. In-house is not a cost decision here; it is a feasibility decision, and the operational cost is accepted as necessary. The cost is typically 40 to 80 percent higher than the equivalent commercial-cloud stack would be, but commercial cloud is not available.

Cross-links

Related cost references

Frequently asked

In-house vs vendor zero trust cost questions

Can we actually build zero trust in-house with open source?
Technically yes, financially rarely. The open-source components exist: Keycloak or Authentik for identity, OpenZiti or HashiCorp Boundary for ZTNA, Open Policy Agent for the Policy Engine, SPIFFE / SPIRE for workload identity, Falco for runtime security, Wazuh for SIEM, Vault for secrets. A full in-house zero trust stack on open source has zero license cost. The real cost is operational: a 500-user organisation needs roughly 2 to 3 dedicated platform engineers ($300K to $600K loaded annually) plus ongoing operational overhead to maintain a stack that commercial vendors maintain for you. Total cost of ownership is typically equal to or higher than commercial for organisations under 5,000 users.
When does in-house zero trust win on cost?
Three scenarios. First, very large organisations (10,000+ users) where commercial per-user licensing becomes a material budget item and dedicated platform-engineering teams already exist. Second, organisations with deep open-source expertise already in place, where the operational overhead is absorbed into existing roles rather than requiring new hires. Third, regulated or sovereign organisations where data-residency or supply-chain concerns make commercial cloud-delivered platforms unacceptable, and in-house is the only option regardless of cost. Outside these scenarios, in-house typically loses on total cost of ownership.
What are the open-source components for each zero trust pillar?
Identity: Keycloak (Red Hat), Authentik, Zitadel, FreeIPA for AD-replacement. ZTNA: OpenZiti, HashiCorp Boundary, Pomerium, Teleport (mixed open-core). Policy Engine: Open Policy Agent (OPA), Casbin. Workload identity: SPIFFE / SPIRE. Microsegmentation: Cilium with eBPF, Calico. SIEM: Wazuh, Graylog, OpenSearch Security Analytics. Secrets vault: HashiCorp Vault (mixed open-core), Mozilla SOPS. EDR: Wazuh again (with HIDS), osquery for endpoint visibility. DLP: limited open-source coverage; this is the gap that often forces commercial purchase.
What does the operational overhead actually look like?
For a 500-user organisation running a full open-source zero trust stack: roughly 2 to 3 platform engineers dedicated to keeping the stack running. Tasks include upgrade management (every component has its own release cadence and breaking changes), integration testing (every component needs to keep working with every other), CVE response (you patch, not the vendor), capacity planning, log retention infrastructure, and the long tail of operational debugging when something breaks at 2am. The 2 to 3 FTE estimate is consistent across mid-market in-house stacks; some claim lower with heroic individual engineers, but those stacks tend not to survive the engineer leaving.
What is a credible hybrid approach?
Use commercial for the pillars where vendor differentiation is high (identity, ZTNA, EDR), and open source for the pillars where vendor differentiation is low and operational complexity is manageable (workload identity, basic SIEM, secrets vault for non-customer-facing services). This is the dominant pattern in 2026 for mid-market and lower-enterprise organisations. Cost: roughly 60 to 80 percent of pure-commercial total cost, with the saving concentrated in workload-identity and secrets-management infrastructure. Operational overhead: roughly 0.5 to 1 platform engineer dedicated to the open-source pieces, versus the 2 to 3 required for full in-house.
How much does Keycloak actually cost to run?
Keycloak itself is free. Running Keycloak in production at mid-market scale: roughly 0.5 to 1 platform engineer ($75K to $200K loaded annually), plus infrastructure costs for the database, the Keycloak servers, the load balancer, the backup infrastructure, and the monitoring stack (typically $20K to $60K per year for cloud infrastructure to run a production-grade Keycloak deployment). Total Keycloak TCO at 500 users is $100K to $260K per year. Compare with Microsoft Entra P1 at $6 per user per month for 500 users, which is $36K per year all-in. Keycloak is more expensive than commercial at this scale; the cost crossover does not happen until 5,000 to 10,000 users.
What is the strongest in-house argument?
Sovereignty. For organisations that genuinely cannot use commercial cloud-delivered platforms due to regulatory or sovereignty requirements (some EU public-sector, some defence, some critical national infrastructure), in-house is not a cost decision; it is a feasibility decision. Within that constrained scope, open-source plus commercial-on-prem is the dominant pattern, with the operational cost accepted as a necessary expense rather than weighed against commercial cloud SaaS. Outside the sovereignty constraint, the in-house argument is harder to make on cost grounds alone in 2026.