Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
NIST SP 800-207

NIST 800-207 implementation cost: building blocks and budget

NIST SP 800-207 is the foundational US zero trust architecture specification. It is not a shopping list; it is an architecture pattern with three core components and seven tenets. This page translates the specification into a budget, names which products typically implement each component, and walks through a sample 500-user 800-user implementation budget.

The spec itself

What NIST SP 800-207 actually says

NIST SP 800-207 (Special Publication 800-207, "Zero Trust Architecture") was published in August 2020 and is the foundational US zero trust architecture specification. It defines zero trust as "an evolving set of cybersecurity paradigms that move defences from static, network-based perimeters to focus on users, assets, and resources". The specification has three core components: the Policy Engine (the decision-making component), the Policy Administrator (the component that establishes and shuts down communication paths based on Policy Engine decisions), and the Policy Enforcement Point (the component that enables, monitors, and terminates connections between subjects and enterprise resources). It also defines seven tenets, which collectively describe how a zero trust architecture should behave.

NIST SP 800-207A ("A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments"), published in September 2023, extends 800-207 with guidance specific to cloud-native and multi-cloud architectures. It addresses workload identity, service mesh, and cloud-native Policy Enforcement Points. From a cost perspective, 800-207A increases the applications-pillar share of total zero trust budget by formalising the workload-identity components that earlier implementations often deferred.

The specification is technology-agnostic by design. It does not say "use Cloudflare for ZTNA" or "use Microsoft Entra for identity". It says "you need a Policy Engine that makes per-request access decisions based on dynamic inputs", and you choose which products implement that. In practice, market consolidation has produced a small number of dominant category-level patterns with predictable cost profiles, which is what the budget tables below reflect.

The seven tenets

What each tenet costs in budget terms

The seven tenets from NIST SP 800-207 section 2.1 translated into the budget areas they drive.

Tenet (paraphrased)Budget impact
All data sources and computing services are considered resourcesDrives applications-pillar scope. Cloud-native estates with many resources cost more.
All communication is secured regardless of network locationDrives baseline encryption (essentially free) and ZTNA / SASE deployment (network-pillar cost).
Access to individual enterprise resources is granted on a per-session basisDrives identity-pillar continuous evaluation. P2-tier identity licensing required.
Access is determined by dynamic policyDrives Policy Engine richness. Risk-based, context-aware policy is the differentiator between P1 and P2 identity tiers.
All asset integrity and security posture is monitored and measuredDrives device pillar full deployment plus posture management.
All authentication and authorisation is dynamic and strictly enforcedDrives phishing-resistant MFA, conditional access, just-in-time admin (PIM).
Enterprise collects information about asset state and uses it to improve securityDrives telemetry collection and SIEM / SOAR. Often cross-billed to SOC budget rather than ZT pillar budgets.
Core components

Policy Engine, Policy Administrator, Policy Enforcement Point: what implements each, what each costs

Policy Engine. The decision-making component that, given a subject (user, device, workload), a resource (application, data, service), and context (risk signals, posture, behaviour), decides whether to allow access. In practice the Policy Engine is most often implemented by the identity provider (Microsoft Entra Conditional Access, Okta Workforce Identity, Ping Identity), the ZTNA platform (Zscaler ZIA / ZPA, Cloudflare Access, Palo Alto Prisma Access), the SSE platform, or a combination. The cost is largely absorbed into existing identity and network pillar licensing rather than appearing as a separate Policy Engine product. Where a standalone Policy Engine is bought, for fine-grained authorisation (PlainID, Axiomatics, Styra OPA Enterprise, Permit.io), pricing runs $50K to $400K per year for mid-market deployments. Most mid-market implementations do not need a standalone Policy Engine; the identity provider plus ZTNA platform together cover the decision-making capability.

Policy Administrator. The component that establishes and shuts down the actual communication path. In modern implementations the Policy Administrator is typically the management plane of the ZTNA or SSE platform, plus the API surface of the identity provider for session establishment. Like the Policy Engine, the Policy Administrator cost is bundled into existing identity and network platform licensing; it rarely appears as a separate budget line.

Policy Enforcement Point. The component that actually blocks or allows traffic based on Policy Engine decisions. PEPs sit at the network layer (ZTNA gateways, microsegmentation enforcement, SWG, SASE edges), the application layer (identity-aware proxies, API gateways), and the data layer (DLP enforcement). PEP cost is bundled into the licensing of ZTNA, SSE, microsegmentation and DLP platforms. The architectural decision that drives PEP cost is how many distinct PEP types you deploy: a minimal architecture with PEPs at one layer (network) is cheaper but less granular than a full architecture with PEPs at network, application and data layers. Most mature 800-207 implementations deploy PEPs at network and application layers, with data-layer PEPs (DLP) deferred to Phase 3.

Sample budget

500-user 800-207 implementation, year-one budget

Representative budget for a mid-market organisation implementing NIST SP 800-207 to CISA Initial-tier maturity in year one, with a plan to reach Advanced tier by year three.

Budget lineYear 1 totalShareNotes
Identity pillar$280K - $520K30-40%SSO, MFA, advanced identity (P2), PAM rollout, IGA Phase 2.
Network pillar$180K - $420K20-30%ZTNA, basic SWG, DNS filtering. Microsegmentation deferred to Phase 2.
Device pillar$140K - $320K15-20%MDM, EDR, posture management, MTD.
Applications pillar$80K - $200K10-15%CSPM or entry-tier CNAPP. API gateway baseline.
Data pillar$80K - $200K10-15%Baseline classification, DLP starter. Deeper data work deferred to Phase 3.
Security architect FTE$130K - $180KAcross pillarsDedicated zero trust programme architect. Mandatory for credible implementation.
Professional services and integration$120K - $400KAcross pillarsIdentity migration, ZTNA connector deployment, EDR rollout, training.
800-207A

What changes for cloud-native organisations

NIST SP 800-207A addresses the cloud-native gap in the original specification. The headline addition is workload identity: every workload (microservice, container, serverless function) should have a cryptographically verifiable identity used for service-to-service authentication. SPIFFE and its reference implementation SPIRE are the dominant open-source pattern. Commercial implementations are bundled into service mesh platforms (Solo Gloo Mesh, Tetrate Service Bridge) or sold as standalone identity fabrics for workloads.

The cost implication is meaningful for cloud-native organisations. A traditional 800-207 implementation might allocate 10 to 15 percent of total budget to the applications pillar. An 800-207A-compliant implementation in a cloud-native environment typically allocates 20 to 25 percent. The increase comes from workload identity tooling, service mesh deployment (commercial or operational cost for open-source), and the engineering work to refactor service-to-service calls to use short-lived tokens rather than long-lived credentials. For organisations targeting CISA Optimal-tier maturity in cloud-native environments, 800-207A compliance is not optional; it is the differentiator between Advanced and Optimal tiers.

Most mid-market cloud-native organisations approach 800-207A in two stages. Stage one is workload identity for the most sensitive service boundaries (anything that touches customer data, payment processing, or privileged administrative actions) in Phase 2 of the zero trust rollout. Stage two is full workload identity across the service estate in Phase 3, often paired with service mesh adoption. The two-stage approach spreads the engineering cost over 18 to 30 months rather than concentrating it in a single twelve-month programme that competes with everything else for engineering bandwidth.

Common architectural patterns

How mid-market implementations actually look

Despite the technology-agnostic spec, real-world implementations cluster into a small number of category patterns. The dominant mid-market pattern is Microsoft-centric: Microsoft Entra for Policy Engine (Conditional Access) and identity, Microsoft Intune for device, Microsoft Defender for Endpoint for EDR, Microsoft Entra Private Access for ZTNA, Microsoft Purview for DLP and classification. This pattern is cheapest in absolute terms for M365 E5 estates and benefits from tight integration across components. It scores lowest on portability (very high lock-in) and on flexibility in non-Microsoft niches.

The next most common pattern is identity-first best-of-breed: Okta or Ping for identity and Policy Engine, Zscaler or Cloudflare for ZTNA, CrowdStrike or SentinelOne for EDR, Microsoft Intune or Jamf for device, Microsoft Purview or Symantec DLP for data. This pattern is more expensive in licensing but more portable and stronger in heterogeneous estates. It is the dominant pattern in mid-market organisations not heavily committed to a single productivity suite.

A third pattern, network-first SASE, leads with a comprehensive SASE platform (Zscaler, Palo Alto Prisma SASE, Cloudflare Magic WAN) and bolts identity, device and data onto it. This pattern is most common in enterprises replacing complex on-premise WAN, proxy and VPN infrastructure. It is the most expensive in absolute terms but addresses the network-replacement decision (which is otherwise expensive on its own) inside the ZT programme rather than alongside it.

Cross-links

Related cost references

Frequently asked

NIST 800-207 implementation cost questions

What does NIST SP 800-207 mandate, in cost terms?
NIST SP 800-207 is the foundational US zero trust architecture specification, published in August 2020. It is not a prescriptive shopping list of products; it is an architecture pattern with seven tenets and three core components (Policy Engine, Policy Administrator, Policy Enforcement Point). The cost-bearing decisions are which technologies implement each component, how richly the Policy Engine consumes context signals, and how broadly the Policy Enforcement Points are deployed. The specification is technology-agnostic, but implementations converge on a small number of category-level patterns with predictable cost profiles.
What is the Policy Engine in budget terms?
The Policy Engine is the decision-making component that, given a subject (user, device, workload), a resource (application, data, service), and context (risk signals, posture, behaviour), decides whether to allow access. In practice it is implemented by the identity provider (Microsoft Entra Conditional Access, Okta Workforce Identity), the ZTNA platform, the SSE platform, or a combination. The cost is largely absorbed into existing identity and network pillar licensing rather than appearing as a separate Policy Engine product. Where a separate Policy Engine product is bought (PlainID, Axiomatics, Styra OPA, Permit.io for fine-grained authorisation), pricing runs $50K to $400K per year for mid-market deployments.
What is the Policy Enforcement Point cost?
Policy Enforcement Points are the components that actually block or allow traffic based on Policy Engine decisions. They sit at the network layer (ZTNA gateways, microsegmentation enforcement, SWG, SASE edges), the application layer (identity-aware proxies, API gateways), and the data layer (DLP enforcement). PEP cost is bundled into the licensing of ZTNA, SSE, microsegmentation and DLP platforms; it does not appear as a separate line item. The architectural decision that drives PEP cost is how many distinct PEP types you deploy: a minimal architecture with PEPs at one layer (network) is cheaper but less granular than a full architecture with PEPs at network, application and data layers.
What does NIST 800-207A add?
NIST SP 800-207A, published in September 2023, extends 800-207 with guidance specific to cloud-native and multi-cloud zero trust architectures. It addresses workload identity (SPIFFE / SPIRE), service mesh, and cloud-native Policy Enforcement Points. From a cost perspective, 800-207A increases the applications-pillar share of total zero trust budget by formalising the workload-identity components that traditional 800-207 implementations often deferred or skipped. Organisations targeting CISA Optimal-tier maturity in cloud-native environments need 800-207A compliance, which adds 15 to 25 percent to applications-pillar cost.
How many products do we need to implement 800-207?
Architecturally, the minimum is one identity provider (the dominant Policy Engine), one ZTNA platform (the dominant network Policy Enforcement Point), and one endpoint management platform (the dominant source of device-posture signal). In practice, mid-market implementations end up with 8 to 14 distinct products spanning the five CISA pillars, and enterprise implementations with 15 to 25. The product count is less important than the integration completeness: a tightly integrated three-product architecture often outperforms a sprawling 20-product architecture on both cost and security efficacy.
How long does NIST 800-207 implementation take?
Two to four years for full CISA Optimal-tier maturity built on 800-207 principles. Phase 1 (Foundation: identity and device) is 3 to 9 months and consumes 40 to 50 percent of total budget. Phase 2 (Expansion: network and applications) is 6 to 18 months at 35 to 45 percent of budget. Phase 3 (Optimisation: full data, advanced telemetry, machine identity) is 12 to 24 months at 15 to 25 percent of budget. Microsoft-first stacks often complete Phases 1 and 2 in under a year because so much is bundled into M365 and Defender.
Where does the budget actually go in a 500-user 800-207 implementation?
For a 500-user mid-market organisation, expect year-one total of $800K to $1.5M. Roughly: identity 30 to 40 percent ($280K to $520K), network 20 to 30 percent ($180K to $420K), device 15 to 20 percent ($140K to $320K), applications 10 to 15 percent ($80K to $200K), data 10 to 15 percent ($80K to $200K). Of that total, licensing is 40 to 60 percent and the rest is professional services, integration, training, and the dedicated security architect FTE. Ongoing annual cost in steady state is roughly 35 to 40 percent of year-one total.