Traditional perimeter-based security has become obsolete. By 2025, 60% of enterprises will phase out most of their remote access VPNs in favor of ZTNA. IBM’s *CostTraditional perimeter-based security has become obsolete. By 2025, 60% of enterprises will phase out most of their remote access VPNs in favor of ZTNA. IBM’s *Cost

Zero Trust Network Access(ZTNA) Enforcement Using Real Time Risk Scoring & Dynamic Path Segmentation

\ As organizations rapidly embrace cloud services, remote work, and distributed architectures, traditional perimeter-based security has become obsolete. Today’s users, devices, and applications operate far beyond corporate network boundaries—rendering legacy security models ineffective against modern threats.

According to Gartner, by 2025, 60% of enterprises will phase out most of their remote access VPNs in favor of ZTNA. Meanwhile, IBM’s Cost of a Data Breach Report shows that organizations with Zero Trust deployed saved an average of $1.76 million per breach.

As threats grow more dynamic and sophisticated, ZTNA itself must evolve. The next phase of Zero Trust requires access decisions that adapt in real time—driven by continuous risk assessment and enforced through dynamic path segmentation.

Why Traditional ZTNA Needs Real-Time Adaptability?

Traditional ZTNA models authenticate users and validate device posture before granting access. But after authentication, most policies remain static—unable to respond to changes in user behavior, device compromise, or emerging threats during an active session. This exposes organizations to risks that appear after access is granted.

For example, a device may become infected mid-session, or a trusted user may begin accessing unusual resources. Static controls simply cannot detect these shifts.

Real-World Example: The SolarWinds Lesson

The 2020 SolarWinds attack demonstrated exactly why static access decisions fail. Attackers compromised legitimate credentials and moved laterally through networks for months all while appearing as trusted users.

A dynamic, risk-aware ZTNA system would have:

  • Flagged anomalous behavior
  • Triggered step-up authentication
  • Restricted or revoked access

before substantial damage occurred.

Where Static ZTNA Fails: Specific Scenarios

  1. Credential theft \n A user’s credentials are stolen via phishing, but their device and session remain trusted.
  2. Insider threat \n An authenticated employee begins accessing unusual resources.
  3. Session hijacking \n An attacker takes over a valid authenticated session.
  4. Device compromise \n Malware infects a previously compliant device mid-session.

Static ZTNA cannot respond to any of these threats once initial access is granted.

Real-Time Risk Scoring: The Engine of Adaptive Access

Real-time risk scoring adds a continuous evaluation layer that monitors user and device trustworthiness throughout an active session. Instead of relying on a one-time identity check, the system calculates a composite, evolving risk score based on:

Key Risk Inputs

  • User behavior: Login anomalies, activity deviations, unusual access patterns
  • Device posture: OS version, patch level, security configuration, EDR signals
  • Environmental signals: Geolocation, connection source, network reputation
  • Threat intelligence: Known malicious IPs, IOCs, active attack campaigns

With continuous scoring, ZTNA can dynamically adjust permissions:

  • Low risk → seamless access
  • Medium risk → step-up authentication or restricted access
  • High risk → session termination or quarantine

This ensures that access privileges always reflect the current threat landscape, not outdated assumptions.

Dynamic Path Segmentation: Reimagining Secure Connectivity

Dynamic path segmentation complements real-time risk scoring by enforcing least-privilege network access at the transport level. Unlike VPNs which provide broad network exposure once authenticated—dynamic segmentation creates per-application secure pathways that exist only as long as trust conditions remain valid.

These microtunnels:

  • Are built using software-defined routing
  • Exist only for individual applications
  • Offer zero lateral movement
  • Automatically adjust or terminate based on risk changes

How Dynamic Path Segmentation Works?

\ ** How Dynamic Path Segmentation works **

\ Each routing path corresponds to a dedicated network segment with unique security controls, logging levels, and permissions.

ZTNA + Real-Time Risk Scoring + Dynamic Path Segmentation: A Unified Adaptive Model

Together, these three components create an intelligent, self-adjusting Zero Trust architecture.

How the Unified Model Operates

  • Real-time access decisions: Authentication adapts based on the current risk score
  • Continuous monitoring: Risk scores evolve with each user action
  • Network-level enforcement: Path segmentation isolates users based on trust
  • Feedback loop: Logged events improve future detection accuracy

Access always reflects least privilege, and threats are contained before lateral movement occurs.

Implementation Considerations

When rolling out this unified model, organizations should consider:

  1. Start with visibility \n Deploy risk scoring in monitoring mode to baseline behaviors.
  2. Phased enforcement \n Introduce step-up authentication first before enabling automated blocking.
  3. Integration requirements \n Connect SIEM, identity provider, and endpoint tools to feed risk signals.
  4. False positive tuning \n Overly aggressive thresholds create friction—tune gradually.
  5. Compliance alignment \n Map risk thresholds to regulatory frameworks (PCI-DSS, HIPAA, SOC 2).

Key Integration Points

  • Identity Provider (IdP): User identity & posture
  • EDR: Device health and threat signals
  • SIEM/SOAR: Threat intelligence correlation
  • CASB: Application visibility and governance

Common Pitfalls and How to Avoid Them

1. Over-Aggressive Risk Thresholds \n Problem: Excessive false positives frustrate users. \n Solution: Start permissively in monitoring mode and tighten gradually.

2. Insufficient Signal Sources

Problem: Limited visibility results in inaccurate scoring. \n Solution: Integrate multiple data streams for holistic assessment.

3. Ignoring User Experience

Problem: High friction drives users to insecure workarounds. \n Solution: Optimize for low-risk common cases; add friction only when needed.

4. Static Policies on Dynamic Systems

Problem: Treating risk scoring as set-and-forget. \n Solution: Review thresholds and detection patterns regularly.

Conclusion

Zero Trust Network Access has become a foundational element of modern cybersecurity, but its effectiveness depends heavily on its ability to evolve alongside the shifting threat landscape. Traditional, static ZTNA models while valuable are no longer sufficient in an environment where user behavior, device posture, and external threat conditions can change at any moment. By integrating real-time risk scoring and dynamic path segmentation, organizations can elevate ZTNA from a one-time gatekeeper into a continuously adaptive security framework. This dynamic approach ensures that trust is never assumed and that access decisions reflect current conditions rather than outdated assumptions made at login.

The combination of continuous risk assessment and flexible, per-application segmentation dramatically reduces the chances of lateral movement, session compromise, or unnoticed insider threats. This unified model provides security teams with unprecedented visibility and responsiveness, enabling them to contain risks before they escalate into breaches. At the same time, it improves user experience by removing unnecessary friction for trusted interactions and only introducing additional checks when warranted by risk signals.

Looking forward, the future of adaptive ZTNA will be shaped by advances in AI, predictive analytics, and cross-organization threat intelligence. As these technologies mature, organizations will gain the ability to anticipate risks rather than simply react to them. Those who adopt adaptive ZTNA today will be better equipped to handle the increasingly sophisticated threats of tomorrow, strengthening both operational resilience and user trust.

For organizations ready to take their next step, the path forward begins with assessing current access controls, identifying risk signal gaps, and piloting real-time scoring in a targeted environment. With thoughtful implementation and ongoing refinement, adaptive ZTNA becomes not just a security enhancement, but a transformative shift in how access is governed across the enterprise.

\

:::tip This story was distributed as a release by Sanya Kapoor under HackerNoon’s Business Blogging Program.

:::

\

Market Opportunity
ZeroLend Logo
ZeroLend Price(ZERO)
$0,000007236
$0,000007236$0,000007236
-%17,68
USD
ZeroLend (ZERO) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Hyperliquid's perpetual contract market share dropped to 38%, while Aster and Lighter saw their shares rise.

Hyperliquid's perpetual contract market share dropped to 38%, while Aster and Lighter saw their shares rise.

PANews reported on September 23rd that according to CoinDesk, Hyperliquid, once a leading player in the on-chain perpetual swap market, is gradually being overtaken by emerging platforms such as Lighter and Aster, resulting in a decline in market share. According to Dune data, Hyperliquid's market share of the on-chain cryptocurrency perpetual swap market reached 71% in May of this year, but has now fallen to 38%. Meanwhile, Lighter and Aster's market shares have increased from low single-digit percentages in May to 16.8% and 14.9%, respectively. The on-chain perpetual swap market is experiencing rapid growth. Over the past four weeks, cumulative trading volume across all platforms has approached $700 billion, with $42 billion traded in the last 24 hours alone. The number of on-chain perpetual swap protocols has rapidly increased from just two in 2022 to over 80 today. This growth demonstrates the vitality of the market: a thriving market attracts numerous new participants, intensifying competition and challenging the market share and profitability of early entrants.
Share
PANews2025/09/23 17:24
Hong Kong Backs Commercial Bank Tokenized Deposits in 2025

Hong Kong Backs Commercial Bank Tokenized Deposits in 2025

The post Hong Kong Backs Commercial Bank Tokenized Deposits in 2025 appeared on BitcoinEthereumNews.com. HKMA to support tokenized deposits and regular issuance of digital bonds. SFC drafting licensing framework for trading, custody, and stablecoin issuers. New rules will cover stablecoin issuers, digital asset trading, and custody services. Hong Kong is stepping up its digital finance ambitions with a policy blueprint that places tokenization at the core of banking innovation.  In the 2025 Policy Address, Chief Executive John Lee outlined measures that will see the Hong Kong Monetary Authority (HKMA) encourage commercial banks to roll out tokenized deposits and expand the city’s live tokenized-asset transactions. Hong Kong’s Project Ensemble to Drive Tokenized Deposits Lee confirmed that the HKMA will “continue to take forward Project Ensemble, including encouraging commercial banks to introduce tokenised deposits, and promoting live transactions of tokenised assets, such as the settlement of tokenised money market funds with tokenised deposits.” The initiative aims to embed tokenized deposits, bank liabilities represented as blockchain-based tokens, into mainstream financial operations. These deposits could facilitate the settlement of money-market funds and other financial instruments more quickly and efficiently. To ensure a controlled rollout, the HKMA will utilize its regulatory sandbox to enable banks to test tokenized products while enhancing risk management. Tokenized Bonds to Become a Regular Feature Beyond deposits, the government intends to make tokenized bond issuance a permanent element of Hong Kong’s financial markets. After successful pilots, including green bonds, the HKMA will help regularize the issuance process to build deep and liquid markets for digital bonds accessible to both local and international investors. Related: Beijing Blocks State-Owned Firms From Stablecoin Businesses in Hong Kong Hong Kong’s Global Financial Role The policy address also set out a comprehensive regulatory framework for digital assets. Hong Kong is implementing a regime for stablecoin issuers and drafting licensing rules for digital asset trading and custody services. The Securities…
Share
BitcoinEthereumNews2025/09/18 07:10
Jerome Powell & A Hard Money Moment

Jerome Powell & A Hard Money Moment

With Trump teeing up a personally controlled Federal Reserve, hard money seems like an easy bet, but Bitcoin and gold aren't behaving the same.
Share
Coinstats2026/01/15 06:30