SAP NS2

Zero Trust Architecture: How SAP NS2 embeds it into our cloud strategy

Zero Trust Architecture: How SAP NS2 embeds it into our cloud strategy

The cybersecurity landscape has fundamentally changed over time. There’s been a growth in ransomware attacks, cyber criminals exploit traditional security models, and as our defense mechanisms grow in sophistication, so do surrounding threats.

Perimeter-based security models, a legacy method designed for when data lived exclusively in corporate data centers, is no longer sufficient. Customers need more, and that’s where Zero Trust Architecture (ZTA) comes into play. Customer missions increasingly rely on scalable, adaptable cloud solutions, and ZTA is an essential security framework that protects every connection, endpoint, and access request.

At SAP National Security Services (SAP NS2), ZTA isn’t just a security framework. It’s a foundational element of our cloud strategy and a key competitive differentiator. Founded with the core purpose of delivering innovation to U.S. government agencies, SAP NS2 is fundamentally built on security. As a FOCI mitigated, independent, U.S. subsidiary of SAP, our teams remain dedicated to security and build on the strength of SAP’s product innovation, research and development, and legacy in the tech industry.

Understanding Zero Trust: Assume nothing, verify everything

ZTA operates on a simple but powerful principle: implicit trust isn’t granted to any user, device, or application, no matter the location or previous access history. Every transaction undergoes continuous verification to ensure identity and align with security policies. There are no shortcuts, no assumptions, and no implicit trust based on familiarity.

This security model addresses a critical vulnerability in traditional approaches, which is the domino effect of implicit trust. In perimeter-based security, applications inside the corporate network automatically trust each other. But in today’s hybrid and multi-cloud environments, one compromised application can expose multiple critical systems, placing the entire organization at risk.

Why U.S. public sector agencies need Zero Trust

As the U.S. Federal Government explores ways to accelerate, improve, and build upon the U.S. cybersecurity strategy, ZTA is a core pillar. In the recently published Cyber Strategy for America, ZTA is called out as a cybersecurity best practice. It’s a strategy that can protect National Security Systems (NSS) and mitigate malicious actors from accessing mission-critical data, and it’s important that agencies begin implementing it.

ZTA not only strengthens cybersecurity posture, but it enables agencies to operate more securely and efficiently. Organizations can better protect critical systems while supporting their modern mission needs, as ZTA provides several key operational and mission benefits:

ZERO TRUST BENEFITS FOR U.S. PUBLIC SECTOR AGENCIES

Improved mission impact

Improved operational resilience

Faster ATO times

Improved time and personnel allocation

Protected supply chain

Why Zero Trust matters for SAP NS2

SAP NS2 operates in one of the most complex and demanding security environments in the industry. We deliver secure, resilient, and compliant cloud services to industries ranging from Healthcare and Utilities to Aerospace and Defense, State and Local Governments, and Federal Agencies. These entities depend on us to protect their most sensitive data and mission-critical applications.

Supporting this diverse set of industries, where each customer may have varying accreditation needs, requires a security model that goes beyond traditional approaches. Zero Trust isn’t just a best practice for us. It’s a business imperative that enables us to:

  • Deliver mission assurance across platforms, applications, and managed services
  • Support both single-tenant and multi-tenant capabilities while maintaining strict isolation
  • Ensure compliance with the most stringent security requirements
  • Enable innovation without compromising security posture
  • Strengthen our position as a trusted partner to government and enterprise customers

Implementing Zero Trust at SAP NS2

Our Zero Trust strategy aligns with Department of War (DOW) ZTA principles, while still tailoring our approach to the realities of commercial cloud operations and diverse regulatory frameworks.

We advance Zero Trust activities across all seven DOW pillars:

  1. User: Strong identity and access controls (ICAM) ensure every user is continuously authenticated and authorized based on risk-based policies.
  2. Device: Device posture validation confirms that only compliant, secure devices can access our environments.
  3. Network/Environment: Secure isolation of tenants and applications through micro-segmentation minimizes the blast radius of potential breaches.
  4. Application & Workload: Transaction-level security validates every interaction, eliminating implicit trust between applications.
  5. Data: Encrypted data flows across hybrid, multi-cloud, and federated networks protect information in transit and at rest.
  6. Visibility & Analytics: Continuous monitoring provides real-time insights into security and potential threats.
  7. Automation & Orchestration: Adaptive risk-based decision-making enables dynamic responses to evolving threats.

Beyond the DOW pillars, our Zero Trust implementation is built on four foundational tenets:

1.
Transaction-level security
We apply security controls at every transaction, not just at the perimeter. While perimeter security provides the first line of defense, it’s insufficient in today’s hybrid and cloud environments. Every interaction is independently vetted.
2.
Layered security with micro-perimeters
Our layered security approach creates micro-perimeters through careful segmentation of systems and applications, dramatically reducing exposed surface area.
3.
Zero trust policy
We’ve eliminated implicit trust between applications. Every application interaction is verified, regardless of source or history.
4.
Dynamic security
We continuously diagnose threats and adapt our mitigation strategies in real-time.

In support of these tenets, our customers require sophisticated isolation and security controls as they operate across varying cloud environments. We provide this through:

Tenant isolation
We maintain strong boundaries in shared cloud platforms through multiple VPC layers—Customer Edge VPC, Backend VPC, and Management VPC. The Edge VPC serves as the secure entry point for customer traffic, while the Backend VPC hosts SAP workloads fully isolated from direct internet exposure, accessible only via private links.
Accreditation alignment
We meet GovRAMP, FedRAMP, and Impact Level (IL) requirements across our platforms, allowing us to serve diverse customer missions without compromising security standards.
Cross-domain security
All data flows between VPCs use private links exclusively, never traversing the public internet. Customer on-premises connectivity is established via Site-to-Site IPSec VPN, with dedicated interconnect options for higher performance. Firewall rules govern all inter-VPC communication, with distinct controls for each solution tier—Web, Application, and Data.

Lastly, we leverage automation and integration capabilities across our security domains. This is carried out through the following strategies:

Identity & access management (IAM)
Role-based access controls ensure only authorized users and services can interact with workloads, with every access request undergoing continuous verification.
Endpoint and device security
Device trust posture is verified before granting access, preventing compromised or non-compliant devices from connecting.
Network segmentation & micro-perimeters
Sophisticated segmentation restricts lateral movement, with service controls enforcing perimeters for compliance and data protection.
Data security tools
Encryption, tagging, and loss prevention technologies protect data in transit and at rest, with granular controls based on classification and sensitivity.
Analytics & CSOC integration
Continuous monitoring, threat detection, and real-time analytics enable adaptive risk-based decision-making and rapid response to emerging threats.

This integrated approach to ZTA leverages native security controls, network segmentation, and robust access management, in turn creating comprehensive protection across all of our customer environments. By integrating Zero Trust into our operations, we deliver improved efficiency, enhanced scalability, and accelerated innovation. Our secure-by-design practices make SAP NS2 a stronger partner and stakeholder when it comes to trust.

The journey, not the destination

It’s important to understand that Zero Trust has no defined end state. You never actually “arrive.” It’s an information security model that organizations must continuously refine by integrating new technologies and adapting to emerging threats.

At SAP NS2, we embrace this reality. Every new application, every system update, every change in the threat landscape requires us to reassess and refine our approach.

This continuous evolution is particularly critical for organizations like ours, operating at the intersection of commercial cloud innovation and national security requirements. Our customers can’t afford security gaps, and neither can we.

As SAP NS2 continues to advance our Zero Trust implementation, we’re not just strengthening our security posture, we’re reinforcing our commitment to our customers’ missions. Whether supporting commercial enterprises, state and local governments, or federal agencies, we ensure that security, compliance, and mission assurance are foundational to everything we deliver.

In an era where cyber threats grow more sophisticated daily and ransomware attacks threaten organizations of all sizes, ZTA isn’t optional. It’s essential. At SAP NS2, we’ve embedded it into the very fabric of our cloud strategy, ensuring that we remain a trusted partner capable of delivering secure solutions that enable innovation while meeting the most stringent security requirements.

Because in the world of national security and mission-critical operations, trust must always be earned.

Ready to learn more about how SAP NS2 can accelerate your organization’s zero trust policies? Implement ZTA and connect with us today.

Written by

Ted Wagner

Vice President & Business Information Security Officer (BISO)

Related news & insights

What can we help you find today?