Home / Use Cases / Zero Trust

How do we pragmatically introduce a Zero-Trust baseline in the Mittelstand?

Zero Trust is not a product you buy. We build the baseline in realistic steps — identity inventory, Conditional Access, device baseline, guest governance — without your employees going on strike.

MFA is introduced, that was the first big step. Still, you have the feeling that the security of your Microsoft 365 tenant continues to sit on thin ice: nobody knows exactly who has which accesses, Conditional Access is a mystery, and whether the notebooks of the field-sales team are compliant, you can only hope. Zero Trust is not a product you buy. We build the baseline with you in three realistic steps, without your employees going on strike.

Do you have this situation?

Why solve this now instead of postponing

Zero Trust is not a buzzword but a pragmatic answer to a changed world: users work from anywhere, devices are managed to varying degrees, identities are the actual gate to the company. Whoever continues to anchor security solely to network boundaries (“firewall at the site”) is playing a game that worked ten years ago. Today most attacks come via compromised identities, not via breached firewalls.

The uncomfortable news: introducing a complete Zero Trust architecture in a mid-market company is not a three-week project. The good news: the baseline — the most important 70 to 80 percent of the effect — is doable, and it’s doable without a big-bang migration.

Typical triggers that are now due:

How it would look at your company

We deliberately don’t tackle this as a big-bang, but in three steps — identity, devices, governance. Per step a test phase with a small group, then rollout. Whoever enforces everything at once locks out half the workforce on Monday morning, and trust is then gone for months.

Step 1 — Identity inventory and MFA gap-closure

Before we build Conditional Access, we do an honest assessment: which accounts exist in the tenant, which are active, which are privileged, where is MFA really missing? We also look at the uncomfortable areas: former employees whose account is “by mistake” still active; service accounts with old passwords; management accounts that were kept out of the MFA obligation as a “special exception”.

Delivery: an identity overview in which every account has a status (active/inactive, MFA status, privileged role yes/no, last login). Plus a prioritized gap-closure plan. This step alone discovers in most mid-market tenants between 5 and 20 accounts that nobody needs anymore — or that should long since have been protected.

Stack hints: Entra ID Sign-in Logs, Audit Logs, Microsoft Graph for identity inventory, Entra ID PIM for privileged roles.

Step 2 — Build Conditional Access pragmatically

This is where the biggest lever lies and at the same time the biggest risk. We build a Conditional Access baseline that answers the following core questions:

We implement this step by step: first report-only mode, so we see what a policy would block without actually blocking. Then a trial with IT and volunteer users. Only then broad rollout. Delivery: a documented set of 5 to 10 policies that your tenant carries — with clearly named exceptions for special cases (e.g. CAD workstation without an MFA-capable device, if that really can’t be done otherwise).

Stack hints: Conditional Access (incl. report-only mode), Authentication Strengths, Continuous Access Evaluation, break-glass account pattern.

Step 3 — Device baseline with Intune

Identity alone isn’t enough. If a notebook is compromised, the best MFA doesn’t help. That’s why we build a device baseline: company notebooks are enrolled in Intune, get a compliance policy (BitLocker on, Defender active, OS current), and Conditional Access is extended so that critical applications are only accessible from devices marked as compliant.

For BYOD (employee’s own smartphone also used for the mailbox) we deliberately forgo full management. Instead, App Protection: company data in the Outlook app is protected against copy/paste into private apps, without Nexaro or IT accessing private photos. That’s acceptable for employees and still protects the relevant data path.

Delivery: all company notebooks in Intune, compliance policy active, BYOD smartphones with App Protection. Plus an onboarding path for new devices (Autopilot), so this doesn’t fall apart again.

Stack hints: Microsoft Intune, Compliance Policies, App Protection Policies, Autopilot, Defender for Endpoint onboarding.

Step 4 — Guest governance and privileged access

External persons who have had access for years are a frequently overlooked risk. We build a review rhythm with you: all guest accounts are confirmed once per quarter by the inviting person — whoever isn’t confirmed is automatically deactivated. Plus access reviews for internal privileged roles: who is Global Administrator, who is SharePoint Administrator, is this still justified?

Delivery: a quarterly rhythm for access reviews, set up in the tenant, with clear responsibilities. Plus a configured Privileged Identity Management for the top roles — so that, for example, Global Admin rights are not permanently assigned but activated on demand for a few hours.

Stack hints: Entra ID Access Reviews, Entra ID PIM, Entitlement Management for guest onboarding.

Step 5 — Employee communication and understanding

This is the step where most Zero Trust projects fail — not on the technology. We help you communicate internally what changes for users, why, and when. A short email to everyone is not enough. We propose a small package: a one-pager for management (why are we doing this at all), a one-pager for users (what changes concretely, what do I have to do), a Q&A list for the most frequent questions, and a clear contact person for the rollout phase.

Delivery: communication material in your language, approved by management, rolled out one week before the respective policy activation.

What you should look out for along the way

What realistically changes afterwards

What you contribute

Risks and when it doesn’t fit

How the conversation starts

Book an initial conversation

Frequently asked questions

Do we need Microsoft E5 to introduce Zero Trust? No. Business Premium or E3 are enough for a solid baseline — MFA, Conditional Access, Intune and Defender for Endpoint are included there. E5 brings additional features like risk-based authentication and Defender for Identity, which make sense in larger environments. In the Mittelstand, Business Premium is sufficient for most scenarios.

How long does the baseline introduction take? Realistically 3 to 6 months from identity inventory to a stable Conditional Access configuration with device compliance, depending on size and starting state. That’s not a three-week project — and it shouldn’t be, if the workforce is to be able to keep working at the end.

Will our employees accept it? If the communication runs well and management visibly comes along: yes. Conditional Access is hardly noticeable in daily work for most users — they sign in once in the morning with MFA, then it runs. It only becomes noticeable in special cases (access from an unknown device, travel outside DACH), and exactly there it should be noticeable.

What if we need emergency access and MFA doesn’t work? That’s what the break-glass account is for — a deliberately exempted emergency account with a very long password that sits in a safe. Nobody uses it in daily work, but it exists for the day on which the MFA provider, the internet or Conditional Access itself causes problems. Setting up the break-glass account is mandatory, not a nice-to-have.