Zero Trust Security for Small Businesses in Berlin: A Practical Implementation Guide
“Zero Trust” has become one of the most overloaded terms in enterprise security. It is simultaneously a genuine architectural principle and a marketing label that vendors paste onto products that have nothing to do with the original concept. For Berlin SMBs trying to improve their security posture without an enterprise security team, the noise-to-signal ratio is brutal.
This guide strips out the vendor positioning and explains what Zero Trust actually means operationally, which components matter for a 10–100 person business, and how to implement them using tools you almost certainly already pay for via Microsoft 365.
What Zero Trust Actually Means
The term originated from a 2010 Forrester Research paper by John Kindervag. The core principle is simple: never trust, always verify. Traditional network security assumed that anything inside your office network was trustworthy. Zero Trust assumes every request — regardless of where it originates — is potentially hostile until proven otherwise.
In practical terms, Zero Trust collapses to three operational requirements:
Verify identity explicitly. Every user and every device must authenticate strongly (MFA, certificate, or passwordless) before accessing any resource. Network location is not a substitute for identity verification.
Use least-privilege access. Users and applications get only the permissions they need for the specific task at hand. No standing admin access, no broad share permissions, no service accounts with domain admin rights.
Assume breach. Design your segmentation and monitoring as if an attacker is already inside your network. Contain the blast radius of any single compromised credential or endpoint.
That is the entirety of the Zero Trust principle. Everything else — microsegmentation, SASE, ZTNA, SDP — is an implementation pattern that applies these three principles to specific contexts.
The Zero Trust Stack for an SMB
For a Berlin SMB running Microsoft 365 Business Premium, you have most of the Zero Trust toolkit already licensed. The gap is usually configuration and policy, not product.
| Zero Trust Layer | Tool Available in M365 BP | What It Controls |
|---|---|---|
| Identity | Entra ID + Conditional Access | Who can authenticate, from where, under what conditions |
| Endpoints | Microsoft Intune + Defender for Endpoint | Device health, compliance posture, EDR |
| Applications | Entra App Proxy / Conditional Access for Apps | Which apps users can access, on which devices |
| Data | Microsoft Purview (Information Protection) | Sensitivity labels, DLP, encryption at rest and in transit |
| Network | Defender for Cloud Apps (CASB) | Shadow IT discovery, cloud app access policies |
| Visibility & response | Microsoft Sentinel (add-on) / Defender XDR | SIEM, threat detection, incident response |
Phase 1: Identity Is the New Perimeter (Do This First)
The single highest-impact Zero Trust action for any SMB is enforcing MFA across all user accounts — including break-glass admin accounts — and eliminating password-only authentication. If you do nothing else from this guide, do this.
Practical steps in Entra ID:
Enable Security Defaults if you have not already. This enforces MFA for all users, blocks legacy authentication protocols (SMTP AUTH, IMAP, POP3), and requires MFA for all admin operations. It is a single toggle in Entra ID > Properties > Manage Security Defaults. For most Berlin SMBs under 30 users with no custom Conditional Access requirements, Security Defaults is sufficient and should be deployed immediately.
For organisations that have outgrown Security Defaults — typically when you need per-application or per-location policies — migrate to Conditional Access policies. Key policies to implement:
Require MFA for all users on all cloud apps. Block legacy authentication. Require compliant device (Intune-managed) for access to SharePoint, Teams, and Exchange. Block access from high-risk sign-in locations. Require MFA re-authentication for high-sensitivity operations (e.g., changing security settings, exporting data).
Phase 2: Endpoint Compliance as an Access Gate
Zero Trust’s “verify device” requirement means that Conditional Access should check device health before granting access to corporate resources. An unmanaged, unpatched personal laptop connecting to your SharePoint environment is a risk regardless of how strong the user’s MFA is.
In Intune, define a compliance policy that requires: Windows 10/11 with current security patches, BitLocker encryption enabled, Microsoft Defender real-time protection active, no jailbreak/root on mobile devices. Then create a Conditional Access policy requiring “compliant device” for access to Exchange Online and SharePoint Online.
This closes the most common SMB attack vector: the contractor or executive who authenticates from a malware-infected personal machine that passes MFA but is actively keylogging credentials.
Phase 3: Least-Privilege Access Hygiene
Review and tighten permissions across three domains:
Entra ID roles. Audit who holds Global Administrator. This role should be held by a maximum of two break-glass accounts (with hardware FIDO2 keys, not phone-based MFA), not by the CEO and three other staff because “they needed to do something once.” Use Privileged Identity Management (PIM) if licensed — it converts standing admin access to just-in-time elevation with approval workflows.
SharePoint/OneDrive permissions. “Everyone except external users” sharing on sensitive document libraries is not Zero Trust. Audit your SharePoint sites for overly permissive sharing links. Revoke externally shared links that have expired or are no longer needed. Enable sensitivity labels so confidential documents cannot be forwarded or shared outside defined boundaries.
Service accounts and app registrations. Review Entra ID App Registrations for applications that hold broad API permissions (e.g., Mail.ReadWrite on all mailboxes). Revoke permissions not actively in use. This is frequently where post-breach lateral movement originates — a forgotten app registration with tenant-wide mail access becomes the persistence mechanism.
Phase 4: Email and Endpoint Hardening
Email remains the primary initial access vector for SMB breaches. Zero Trust applied to email means: DMARC/DKIM/SPF enforced (so your domain cannot be spoofed), Defender for Office 365 Safe Links and Safe Attachments enabled, and user training on phishing recognition.
On endpoints, deploy Microsoft Defender for Business (included in M365 Business Premium) with attack surface reduction rules enabled. These rules block specific behaviours commonly used in malware execution: Office macros spawning child processes, credential dumping from LSASS, executable content from email clients, and script obfuscation techniques.
Phase 5: Visibility and Logging
You cannot operate Zero Trust without visibility. At minimum, ensure:
Entra ID sign-in logs retained for 90 days (requires Entra ID P1, included in M365 BP). Microsoft 365 Unified Audit Log enabled and retained. Defender for Endpoint alerts reviewed at least weekly. An alert configured for any Global Administrator sign-in from a new location or device.
For SMBs that have experienced a security incident or operate under NIS2/DSGVO obligations, consider adding Microsoft Sentinel (consumption-billed SIEM) to centralise log ingestion and automate alert triage. At low log volumes (~10 GB/day), Sentinel costs are manageable — typically €150–300/month for an SMB environment.
Common Mistakes to Avoid
Zero Trust implementations fail at SMB scale for predictable reasons: deploying MFA and then creating exceptions for “the CEO’s phone” which is unmanaged and unpatched; running Conditional Access in report-only mode indefinitely because of fear of locking users out; buying additional security tools while the licensed M365 stack remains unconfigured; confusing VPN presence with Zero Trust posture (a VPN is a network control, not a Zero Trust control).
The most effective Zero Trust posture for a Berlin SMB is not the most sophisticated — it is the most consistently applied. A properly configured M365 Business Premium environment with Security Defaults, Intune compliance policies, and DMARC enforcement will defeat the overwhelming majority of SMB-targeted attacks in 2025.
Related Reading
Not sure where your IT security stands?
Our free IT assessment benchmarks your security posture, identifies gaps, and delivers a prioritised action plan — no commitment required.
Also on this topic
Related Articles
Related Articles
