10 April 2026  ·  articles

How Legacy Systems Can Adopt Zero Trust

Legacy infrastructure does not have to be a barrier to Zero Trust. Discover practical strategies for incremental adoption, including segmentation, identity-first security, and overlay technologies.

Knowledge Centre

George Stern, Enterprise Connectivity & Security Specialist | Average Read Time: 4 minutes

Most organisations know they need Zero Trust. Fewer know how to get there when the infrastructure underneath was built in a different era entirely.

The honest reality is that legacy systems create real friction. They were designed when the network perimeter was the security boundary, and trust was implied by location. Unpicking that takes effort. But the assumption that Zero Trust requires ripping everything out and starting again is one of the most persistent and damaging misconceptions in enterprise security.

Zero Trust is a strategy, not a product. And strategies can be applied incrementally. Organisations with deeply embedded legacy infrastructure can adopt Zero Trust principles in a way that is practical, phased, and genuinely effective, without waiting for a full infrastructure overhaul that may never come.


Why legacy infrastructure creates Zero Trust friction

Legacy systems were not built with Zero Trust in mind. They were built for a world where the network boundary was fixed and internal access was broadly trusted. That assumption is often structural, not just cultural, which is what makes it hard to change.

The most common obstacles organisations run into include:

  • Systems that cannot support modern identity protocols such as SAML or OAuth

  • Flat network architectures with no meaningful segmentation between systems

  • Applications relying on hard-coded credentials or shared service accounts

  • Poor visibility into lateral traffic moving between systems inside the network

  • Operating systems too old to patch or update

All delivered as a service, typically via a global cloud platform. 


Start with identity, not infrastructure

The fastest way to make meaningful Zero Trust progress is to start with identity. You do not need to rebuild the network to enforce the principle that every access request should be verified.

Deploying a modern identity and access management (IAM) solution, or integrating with an existing directory service, tightens access control without touching underlying systems. Multi-factor authentication (MFA) adds a verification layer that many legacy environments have never had. Privileged access management (PAM) tools can wrap around older systems to enforce least-privilege access without requiring those systems to be replaced.

Why identity is the highest-impact starting point

Credential theft, phishing, and insider threats are consistently among the most exploited attack vectors. Addressing identity controls reduces exposure across both legacy and modern environments at the same time. It is also the lowest-disruption intervention available because it operates above the infrastructure layer.

For organisations unsure where to begin, identity is the answer. It delivers security improvement quickly, builds internal confidence, and lays the foundation that every subsequent Zero Trust control depends on.


How to segment a legacy network without replacing hardware

Segmentation is one of the most powerful Zero Trust controls available. If an attacker compromises one system, segmentation determines how far they can move from there. For organisations with flat legacy networks, applying segmentation can feel like a major undertaking. It does not have to be.

Micro-segmentation can be applied at the software level using policy, without changes to physical infrastructure. SASE platforms and software-defined networking tools can impose segmentation logic on top of existing architecture, creating isolated zones with their own access rules.

Where to start

Prioritise the assets that matter most. Segment around your most sensitive systems and data first, then work outward. This is not a one-time project; it is an ongoing process of progressively shrinking the attack surface. Each segment you isolate is a meaningful reduction in risk, regardless of what sits on the other side of it.


Using overlay technologies to modernise access without ripping out legacy systems

Overlay technologies are the most practical tool for organisations that cannot afford to replace legacy infrastructure wholesale. They apply modern security controls on top of existing systems without requiring those systems to be changed.

SASE-as-a-Service platforms are the clearest example of this in practice. A cloud-native SASE platform can enforce Zero Trust access controls at the network and session layer, inspect traffic, apply policy, and deliver real-time visibility, all without the underlying application needing to be rewritten or migrated.

This is particularly relevant for legacy applications that cannot support modern authentication protocols. Rather than waiting until those applications can be replaced, organisations can enforce access controls at the point of entry using a Zero Trust overlay. Users are verified before they reach the application. The application itself does not need to change.

The difference between this and a VPN

A VPN grants users broad access to the network. An overlay Zero Trust approach grants access to a specific application only, based on verified identity and device posture, with nothing else exposed. The security improvement is significant, and it can be applied to legacy applications that have not changed in years. Cloud Gateway's Secure Private Access delivers exactly this capability as part of its unified SASE-as-a-Service platform.


A phased approach that builds momentum without disruption

The biggest mistake organisations make is trying to adopt Zero Trust all at once. A phased approach reduces operational risk and creates visible, reportable progress at each stage.

Phase 1: Visibility and discovery

Before enforcing Zero Trust, understand what you have. Map users, devices, applications, and data flows. Identify where trust is being implicitly granted and where access is wider than it needs to be. Every subsequent decision depends on the accuracy of this picture.

Phase 2: Identity and access hardening

Enforce MFA, review service accounts, and implement least-privilege access across the estate. Begin retiring shared credentials. These changes reduce exposure immediately without requiring infrastructure changes.

Phase 3: Segmentation and isolation

Apply micro-segmentation around your highest-risk assets. Use overlay technologies to create enforced policy boundaries. Start monitoring east-west traffic and investigating anomalies.

Phase 4: Application-level Zero Trust

Replace broad VPN access with application-specific, identity-verified connections. Apply conditional access policies that evaluate device posture, location, and risk before granting access.

Phase 5: Continuous verification

Zero Trust is not a project with an end date. Establish continuous monitoring, refine policies based on observed behaviour, and extend controls progressively across the remaining estate. The goal is a security posture that improves over time, not one that is declared complete.


Common misconceptions that stall Zero Trust adoption

  • "We need to replace everything first." The most impactful Zero Trust controls, identity hardening, segmentation, and overlay access controls, can all be applied without replacing legacy systems.

  • "We have to finish cloud migration before we can start." Cloud migration and Zero Trust adoption run in parallel, not in sequence. Many organisations improve their security posture significantly during migration by applying Zero Trust principles to new connections as they build them.

  • "Our legacy systems are too old to be part of this." Legacy systems are often the highest priority for Zero Trust protection, precisely because they are harder to patch and maintain. Applying access controls at the network layer around those systems is a direct response to that risk.

  • "Zero Trust is an enterprise-only concern." The principles are just as relevant for mid-sized organisations. Many of the most significant breaches in recent years targeted organisations that assumed their profile made them a lower-priority target.


How Cloud Gateway helps organisations bridge the gap

Cloud Gateway's SASE-as-a-Service platform is built to meet organisations where they are. It works alongside existing infrastructure rather than demanding its replacement, and it is designed to apply Zero Trust controls progressively as organisations are ready.

ZTNA enforces application-specific, identity-verified access in place of broad VPN connectivity. Traffic is inspected. Policy is enforced consistently. Visibility across the connected estate is complete and real-time. And because the platform is delivered through a UK-based control plane with fully managed or co-managed operating models, organisations can draw on Cloud Gateway's engineering expertise without overloading internal teams.

Contracts are flexible with no vendor lock-in. Deployment is measured in days. The platform holds PSN compliance, HSCN CN-SP accreditation, ISO 27001, Cyber Essentials Plus, and PCI DSS compliant infrastructure, which means compliance obligations are supported across sectors without additional overhead.

Simplified networking. Unified security. Complete control if you want it, support if you need it.

Talk to the Cloud Gateway team about Zero Trust



Tell us your security challenges. We’re here to help.

Security isn’t a bolt-on. Prevention costs less than recovery - in money, time, and public trust.