* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Must-Read Articles](https://www2.paloaltonetworks.com/blog/security-operations/category/must-read-articles/) * Strategy to Implementatio... # Strategy to Implementation with the Zero Trust Advisory Service [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2022%2F05%2Fholistic-approach-to-zero-trust%2F) [](https://twitter.com/share?text=Strategy+to+Implementation+with+the+Zero+Trust+Advisory+Service&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2022%2F05%2Fholistic-approach-to-zero-trust%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2022%2F05%2Fholistic-approach-to-zero-trust%2F&title=Strategy+to+Implementation+with+the+Zero+Trust+Advisory+Service&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2022/05/holistic-approach-to-zero-trust/&ts=markdown) \[\](mailto:?subject=Strategy to Implementation with the Zero Trust Advisory Service) Link copied By [Raf Van der Veken](https://www.paloaltonetworks.com/blog/author/raf-van-der-veken/?ts=markdown "Posts by Raf Van der Veken") May 26, 2022 4 minutes [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [zero trust advisory service](https://www.paloaltonetworks.com/blog/tag/zero-trust-advisory-service/?ts=markdown) [Zero Trust Enterprise](https://www.paloaltonetworks.com/blog/tag/zero-trust-enterprise/?ts=markdown) ### A Holistic Approach to Zero Trust As the urgency and focus around adopting Zero Trust has accelerated, many security professionals are working to assess their organization's readiness and maturity. Despite many vendor's claims that Zero Trust is a product, Zero Trust requires a comprehensive approach that spans both tools and processes in order to be successful. Today, many Palo Alto Networks customers are using our Zero Trust framework and platform to evolve their Zero Trust journey. Recently, we have expanded our Zero Trust services offering with a [Zero Trust Advisory Service](https://www.paloaltonetworks.com/resources/datasheets/zero-trust-advisory-service) to provide high levels of support on the process side of Zero Trust and accelerate our customers' move to a Zero Trust approach. ### Securing Your Digital Transformation Major digital transformation initiatives, such as hybrid workforce and cloud transformation, have further accelerated the need for a Zero Trust approach. As an example, the move to SD-WAN on the network side of the house maps well to modern security models, like ZTNA and SASE within a broader Zero Trust strategy. These factors informed our approach to the creation of our Zero Trust Advisory Service, where we leveraged our broad security expertise and capabilities to figure out how to deliver Zero Trust everywhere, not just in a single security domain, such as endpoint or network security. The Zero Trust Advisory Service is our way of partnering with our customers for an aligned vision that ultimately enables us to succeed together. As a trusted partner, we seek to protect all users, applications and infrastructure by using a consistent set of capabilities and validation criteria, ensuring that blind spots are reduced within each environment. The process starts with high-level technical and business discovery, which moves through strategy, design and implementation phases to reach a more mature level of Zero Trust adoption and continuous improvement. There are key steps in this process: ![Graphic of Zero Trust security architecture implementing a ZT strategy with Zero Trust Advisory Service](https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/05/word-image-14.png) End-to-End Zero Trust: Palo Alto Networks Zero Trust implementation methodology. ### Technical and Business Discovery Visibility and an intimate understanding of which users and devices are connected, what applications are deployed and where critical resources reside is a critical "step 0" in any successful Zero Trust journey. In this phase, the objective is to create a baseline of the existing security posture by collecting data from key stakeholders, as well as understanding the organization's operational priorities and critical assets. ### Architecture and Strategy In this phase, we work to design a vendor-agnostic security architecture and roadmap. We utilize key data points from the previous phase to optimize the architecture and close any gaps discovered in your security posture. This ideal future state will address current cybersecurity challenges, support future cybersecurity needs, and offer all the required controls to implement a Zero Trust strategy going forward. This stage includes the creation of a holistic Zero Trust maturity baseline for the organization and a Zero Trust strategy specific for your use cases. ### Architecture Optimization In this phase, we leverage an organization's existing infrastructure alongside the newly proposed architecture to guarantee the required security capabilities are present. The optimization of the architecture will ensure all identified security gaps have been closed. Prior to implementation, a detailed roadmap and timeline will be provided to the customer, allowing feedback and proper planning. Once final approval is achieved, the optimized architecture will be implemented to make sure the security capabilities align with the Zero Trust strategy. ### Policy Design \& Implementation In this phase, the objective is to design and implement a Zero Trust security policy. The optimized security architecture will be utilized to identify legitimate traffic flows for the enterprise resources, based on the collected data. Next to the technical information, the organization needs to provide input for who can access what resource, when and where. The combination of the technical and business input allows us to design a least-privilege security policy. This policy will be translated into a configuration for specific technical controls that will then be applied to the associated policy enforcement points applicable for a specific use case. ### Monitoring, Maintenance \& Enhancements In this phase, the objective is to continuously evaluate if the implemented Zero Trust security policies still meet the technical and business requirements. Over time, enterprise resource access requirements may change. That's why it's essential for your organization to implement the processes to continuously monitor and validate your Zero Trust security posture. This iterative process will be used to ensure the best possible Zero Trust policy is implemented, based on available security controls, technical and business information for an enterprise resource. [Contact us to learn more](https://start.paloaltonetworks.com/zt-advisory-services.html) about the Zero Trust Advisory Service and how we can help you [become a Zero Trust Enterprise](http://www.paloaltonetworks.com/zero-trust). *** ** * ** *** ## Related Blogs ### [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Building the Zero Trust Enterprise: The Role of the SOC](https://www2.paloaltonetworks.com/blog/2022/02/the-role-of-the-soc/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### The Power of Glean and Prisma AIRS Integration](https://www2.paloaltonetworks.com/blog/2026/02/power-of-glean-and-prisma-airs-integration/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### New Year, New Program, New Opportunities](https://www2.paloaltonetworks.com/blog/2026/02/new-year-new-program-new-opportunities/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Unlock Frictionless Private App Access with Prisma Browser Connector](https://www2.paloaltonetworks.com/blog/sase/unlock-frictionless-private-app-access-with-prisma-browser-connector/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Secure Your App-Verse with Prisma Access Private Application Security](https://www2.paloaltonetworks.com/blog/sase/secure-your-app-verse-with-prisma-access-private-application-security/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Seamless and Secure RDP and SSH Access Using Prisma Browser](https://www2.paloaltonetworks.com/blog/sase/seamless-and-secure-rdp-and-ssh-access-using-prisma-browser/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language