Go back

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

Industry Insights
February 5, 2026
6m read
6m read
6m listen
6m watch
6m watch
Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026
speakers
speakers
speakers
authors
Nate Abbott
participants
No items found.
share

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

The phrase "assume breach" has been a staple of the security lexicon for over a decade. For most CISOs, it’s no longer a radical philosophy but a foundational expectation. We’ve spent the last several years re-architecting our networks, deploying ZTNA to kill the VPN, and hardening the identity perimeter.

But as we settle into 2026, there is a visible disconnect in how we apply this mindset. While we "assume breach" at the network and session layer, we often revert to "assume safety" the moment a user successfully authenticates into the cloud workspace.

We protect the front door with high-assurance MFA, but once an attacker—or a rogue integration—slips past that door, they find themselves in an environment of staggering openness. In Google Workspace, specifically, the default state is often one of high transparency and historical persistence. If a compromise occurs today, the "blast radius" isn't just what the user is doing now; it’s everything they’ve ever done, every sensitive email they’ve ever sent, and every third-party app they’ve ever authorized.

To make Zero Trust meaningful in 2026, we have to extend "assume breach" from the point of entry to the data at rest and the invisible web of machine identities living within our productivity suites.

The identity is the perimeter, but the perimeter is porous

We have leaned heavily on Identity and Access Management (IAM) as the "new perimeter." The logic is sound: if you control the identity, you control the keys to the kingdom.

However, the reality of 2026 is that identities are compromised in ways that bypass even the most robust "gatekeeper" controls. Adversary-in-the-Middle (AiTM) attacks and session hijacking have become commoditized. When an attacker replays a valid session token, they don't just "look" like a legitimate user to Google; for all intents and purposes, they are that user.

For a CISO, the risk here is binary. Either you have controls that function after the login, or you are entirely dependent on a front-door defense that you already know is fallible. A pragmatic approach acknowledges that while Google Workspace offers excellent native security, its primary job is to facilitate collaboration, not to act as a focused security platform.

Severing the link to historical data

One of the most significant oversights in modern Zero Trust implementations is the treatment of data at rest. In a typical Google Workspace environment, an executive’s mailbox is a treasure trove of ten years' worth of M&A documents, legal strategy, and sensitive HR discussions.

If that account is compromised today, the attacker doesn't just get access to today's emails. They get a decade of context.

A pragmatic application of "assume breach" requires us to proactively identify and secure this sensitive data before the incident occurs. This isn't about traditional DLP—which is often too noisy and restrictive to be useful—but about "de-risking" the mailbox. By finding sensitive content and adding a layer of verification (like a step-up MFA challenge) before that specific data can be accessed, we effectively sever the attacker's path to the "crown jewels" without interrupting the user's daily workflow.

The rise of the machine: managing the shadow integration layer

We talk a lot about human identities, but in 2026, the real expansion of the attack surface is in machine identities and OAuth grants.

The supply chain is the new watering hole, and attackers have shifted their focus to the invisible connections we’ve allowed into our environments. When a user clicks "Allow" on a seemingly innocent productivity tool, they may be granting that application the right to read their entire inbox or modify files in Drive.

These permissions often persist indefinitely. They don't expire when a password is changed. They don't care if you have Titan Keys.

Most security teams lack visibility into the true reach of these integrations. To address this, a comprehensive Zero Trust strategy must:

  • Inventory the Reach: Understand not just which apps are connected, but exactly what data they can touch.
  • Monitor Behavior: Detect when an integration starts behaving outside of its expected scope—much like we saw in the Drift/Salesloft incidents.
  • Enforce Least Privilege for Apps: Just as we do for users, we must restrict the permissions of machine identities to the absolute minimum required for their function.

Redefining the blast radius

For a CISO, "risk" is a function of the likelihood of an event and the magnitude of its impact. We have spent billions trying to reduce the likelihood of a breach. It is time we spent an equal amount of effort reducing the impact.

Reducing the blast radius means that when the inevitable "Assume Breach" scenario becomes a reality, the attacker finds themselves in a room with no doors and empty cabinets. They may have the identity, but they don't have the data. They may have the session, but they don't have the permissions.

The path forward

The goal isn't to build a wall that can never be breached: that’s a fantasy. The goal is to build an environment that is resilient by design.

By augmenting the native capabilities of the Cloud Workspace with deep, data-centric protections and identity-aware visibility, we move from a reactive posture to a proactive one. We stop worrying about "if" they get in and start ensuring that it doesn't matter "when" they do.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

Nate Abbott
6
m read
Read post
Podcast

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen to episode
Video

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m watch
Watch video
Downloads

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Watch video
Webinar

Rethinking "Assume Breach": A Pragmatic Approach to Zero Trust in 2026

To make Zero Trust real in 2026, security must extend the "assume breach" mindset beyond the login screen to data at rest and machine identities within the cloud workspace to minimize the blast radius of inevitable compromises.

6
m listen
Listen episode
blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

5
m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New