WatchGuard Blog

Zero Trust According to the NSA: From Initial Access to Continuous Control

Reducing risk in zero trust means monitoring every action within a session. Does your strategy incorporate continuous validation?

We’ve been talking about zero trust for years, and for good reasons. The evolution of threats and the growing sophistication of attacks continue to underscore the need for an approach based on continuous validation, leaving behind the implicit trust that long defined traditional security.

However, many zero trust deployments have focused on strengthening initial access without truly transforming the control model. The mistake isn’t in reinforcing identity, it’s in holding on to a perimeter-based mindset. Today, attackers are increasingly exploiting legitimate identities and valid credentials, reshaping the risk landscape. It’s no longer enough to monitor who enters; what really matters now is understanding what happens after that identity has been validated.

From Identity to Behavior

Let’s consider a simple scenario. An employee successfully accesses the network using valid multi-factor authentication (MFA). Everything seems normal. However, shortly afterward, they begin downloading thousands of customer records at 3 am from a country they’ve never connected to before. In a static model, as long as the session token remains active, this behavior is allowed. In a dynamic authorization model, however, the system detects that this behavior doesn’t match the user’s usual pattern and decides to either block the action or request additional verification.

This reflects an importance shift emphasized by the United States National Security Agency (NSA) in its Zero Trust implementation guideline. Access control is no longer treated as a one-time decision; it becomes a continuous process. In practice, verifying identity or device at the outset is just the starting point, since authorization needs to be reevaluated whenever context, behavior, or access conditions change. From that point on, decisions are based on what the user does after entry, shifting the focus from identity to action.

To achieve this, it is necessary to implement behavior-based evaluation that adjusts privileges based on context and can interrupt sessions or require additional steps when risk increases. In this way, trust is no longer a fixed state; it adapts based on what’s happening at any given moment. 

Of course, none of this works without security controls that can evaluate identity, device posture, access context, and user activity throughout the session. In this model, access is not a one-time event. It is continuously reassessed based on what the user is trying to do, what resource they are attempting to reach, and whether the conditions of trust still hold.

That is why zero trust depends on identity and access working together at the session level. Authentication establishes who the user is, but continuous authorization determines whether that user should keep the same level of access as conditions change. If risk increases during the session, privileges can be limited, step-up authentication can be required, or access can be terminated altogether.

For MSPs, this changes the focus from simply granting secure access to continuously controlling what happens after access is granted. The goal is not just to stop unauthorized entry, but to reduce the impact of compromised identities, stolen tokens, or risky in-session behavior.

Moreover, contextual intelligence doesn’t just identify anomalies. It also helps reduce false positives by understanding normal patterns and distinguishing between legitimate variations and risky behavior. In managed environments with multiple clients, this correlation and analytics capability facilitates prioritization and eases operational burden when signal volume increases.

Beyond Access; The Real Challenge for MSPs

In 2026, risk is no longer defined only by unauthorized access. One of the hardest threats to stop is the misuse of valid identities, because the user may appear legitimate at the point of entry. For MSPs, that means managed security cannot stop at authentication. The focus has to shift to controlling what happens within the session, continuously evaluating activity and limiting impact when risk changes.

It also changes how MSPs shape service commitments and client expectations. The value is no longer just in blocking unauthorized access at login, but in reducing risk throughout the session. That requires continuously validating access conditions and limiting what a user, device, or session can do when trust changes. In practice, the client conversation shifts from prevention alone to continuous control over legitimate access.

The NSA guideline makes it clear that zero trust cannot be understood solely as a verification strategy. Access is just the starting point. Real risk reduction happens when every action can be reevaluated. Authentication validates who you are, while continuous authorization—supported by multiple security layers monitoring activity across endpoints, networks, and identities—validates what you do. Only when both dimensions operate in coordination does zero trust become an effective strategy for reducing operational risk.

The NSA guideline makes clear that zero trust is not just about verifying identity at the moment of access. Access is only the beginning. Real risk reduction happens when trust is continuously reevaluated throughout the session and action can be taken as conditions change. Authentication confirms who the user is, but continuous authorization governs what that user can do, for how long, and under what conditions. When identity and access control work together this way, zero trust moves beyond a point-in-time security check and becomes a practical model for reducing operational risk.