The Commercial Reality Behind Microsoft's Zero Trust Architecture

Microsoft Zero Trust is a marketing framework that references a set of real technical capabilities — but from a licensing perspective, it is not a product you buy. It is a description of a security posture that, when implemented using Microsoft's own technology stack, requires licences across five distinct product families: Microsoft Entra ID (identity), Microsoft Intune (device compliance), Microsoft Defender for Endpoint (endpoint security), Microsoft Sentinel (SIEM/SOAR), and Microsoft Purview (data protection). Each of these product families has its own tier structure, its own M365 bundle interaction, and its own EA negotiation dynamics.

The commercial problem emerges when organisations engage Microsoft field teams for a "Zero Trust implementation" and receive a proposal that maps the Zero Trust pillars to Microsoft product SKUs at list price. In 24 of the last 50 enterprise engagements where we reviewed an incoming Microsoft Zero Trust proposal, the proposal included products already covered by the organisation's existing M365 licence, products licensed at a tier exceeding what the deployment would actually consume, or Sentinel Capacity Reservations sized against theoretical data volumes rather than measured actuals. The average overstatement was $340,000 per year for a 5,000-user organisation.

$340K
Average annual overstatement in Microsoft Zero Trust proposals reviewed for 5,000-user enterprises. Primary drivers: M365 bundle inclusion blindness ($120–$180K), Entra ID P2 full-population provisioning ($80–$120K), and Sentinel tier over-commitment ($80–$140K). Source: Microsoft Negotiations analysis, 500+ engagements.

The Six Zero Trust Pillars — and What Each Costs to Licence

Microsoft organises its Zero Trust guidance around six pillars: Identity, Endpoints, Applications, Data, Infrastructure, and Networks. Each pillar maps to specific Microsoft products and licence tiers. Understanding which tier delivers the security outcome — and which tier is overkill for a given deployment — is the foundation of Zero Trust licence right-sizing.

Identity: Microsoft Entra ID

The identity pillar of Zero Trust requires, at minimum, Conditional Access policies (Entra ID P1) and Multi-Factor Authentication for all users. Entra ID P1 is included in M365 E3/E5. If your organisation already has M365 E3 deployed, you have the licence for Conditional Access — no additional purchase required for the foundational identity control layer.

Entra ID P2 — which adds Privileged Identity Management (PIM), Identity Protection (risk-based conditional access), and Access Reviews — is included in M365 E5 and costs approximately $3/user/month as the P1-to-P2 premium at EA rates. Zero Trust guidance from Microsoft recommends P2 for all users, but the operational reality is that PIM is relevant only to privileged accounts (typically 2–5% of users), Identity Protection risk-based policies are most critical for high-risk roles, and Access Reviews are scoped to specific resource owners. Full-population P2 for a 10,000-user organisation at $3/user/month = $360,000/year. Targeted P2 for 1,500 privileged and high-risk users = $54,000/year. The security outcome for the P2 controls that matter most is preserved. The annual saving is $306,000.

Endpoints: Microsoft Intune + Defender for Endpoint

The endpoint pillar requires device compliance enforcement (Intune) and endpoint detection and response (Defender for Endpoint). Intune Plan 1 is included in M365 E3/E5 — no additional purchase for the device management foundation. Defender for Endpoint Plan 1 ($3/device/month) covers next-generation antivirus, attack surface reduction, and device control — sufficient for the endpoint compliance enforcement layer in most Zero Trust architectures. Plan 2 ($5.20/user/month) adds full EDR, threat hunting, and automated investigation. Plan 2 is included in M365 E5. For organisations on E3, the Zero Trust endpoint question is whether Plan 1 (included in E3 via Microsoft Defender for Business integration at certain scales, or ~$3 standalone) satisfies the risk posture, or whether Plan 2's EDR capabilities are required. For organisations without a dedicated SOC conducting active threat hunting, Plan 1 delivers the Zero Trust endpoint compliance enforcement outcomes. See our detailed analysis of Defender for Endpoint Plan 1 vs Plan 2.

Applications: Entra ID Application Proxy and Conditional Access

The application access pillar (never trust, always verify for application access) is served by Entra ID Conditional Access (P1, included in E3) for cloud applications and Entra Application Proxy for on-premises application publishing (also included in Entra ID P1). The incremental licence requirement for the application pillar in a Zero Trust architecture is zero for organisations already on M365 E3. The Entra ID features that drive application-layer Zero Trust are P1-tier capabilities.

Data: Microsoft Purview Information Protection

The data pillar requires sensitivity labelling, encryption, and data loss prevention policies. The foundation is available in M365 E3: manual sensitivity labels, basic DLP for Exchange and SharePoint, Rights Management encryption. Microsoft Purview Information Protection P2 (auto-labelling, automated classification, Exact Data Match) is included in M365 E5 or available as a standalone add-on at approximately $3.20/user/month. Auto-labelling is materially more effective than manual labelling for data protection outcomes — but requires the organisation to have completed its data classification exercise and defined the label taxonomy before it generates value. Many organisations have purchased Purview P2 and are running on the P1-equivalent features because the auto-labelling deployment has not been completed. See our analysis of Microsoft Information Protection licensing.

Infrastructure: Microsoft Defender for Cloud

The infrastructure pillar, for organisations with Azure workloads, maps to Microsoft Defender for Cloud. Defender for Cloud has a free CSPM tier (continuous security assessment and Secure Score) and paid plans per resource type (~$5–$15/server/month for Defender for Servers). The free CSPM tier is often adequate for organisations in early cloud security maturity. The paid Defender for Servers Plan 2 ($15/server/month) delivers full vulnerability management, agentless scanning, and JIT VM access — justified for production workloads in regulated industries. Non-production and dev/test servers are frequently over-licenced at Plan 2 when Plan 1 ($5/server/month) or no paid plan would satisfy the Zero Trust infrastructure requirements. See Defender for Cloud licensing for the full tier analysis.

Networks: Microsoft Entra Internet Access and Private Access

The network pillar of the Microsoft Zero Trust architecture now includes Entra Internet Access (Secure Web Gateway/SSE) and Entra Private Access (ZTNA replacement for VPN), both part of Microsoft's Global Secure Access (GSA) product. As of 2026, GSA is priced as an add-on to the Entra Suite (approximately $12/user/month for the full Entra Suite including ID Governance and Internet/Private Access) or available in limited preview forms included with certain E5 SKUs. This is the least mature component of the Microsoft Zero Trust licensing stack from an enterprise deployment perspective — most organisations in 2026 have not deployed GSA at scale and should not commit to full-population Entra Suite licences before validating deployment feasibility in a pilot.

Zero Trust Licence Right-Sizing
We map your current M365 estate against the Zero Trust licence requirements pillar by pillar — identifying what you already own, what genuinely requires additional spend, and where Microsoft's proposal overstates the requirement.
Request an Assessment

The Full Zero Trust Stack Cost Model for Enterprise

The table below shows the Microsoft Zero Trust licensing cost for a representative 5,000-user enterprise at EA rates — both the "Microsoft proposal" pattern (full-population premium tiers) and the right-sized deployment.

Zero Trust PillarProduct / TierMicrosoft Proposal CostRight-Sized Cost
Identity (all users)Entra ID P2 (full pop.)$180K/yr (5,000 × $3)$22.5K/yr (750 users)
Endpoints (all devices)MDE Plan 2 (full pop.)$312K/yr (5,000 × $5.20)$180K/yr (E3 included P1 + targeted P2)
DataPurview IP P2 (full pop.)$192K/yr (5,000 × $3.20)$96K/yr (regulated pop. only)
InfrastructureDefender for Servers P2$270K/yr (1,500 servers)$135K/yr (production tier, dev/test P1)
NetworksEntra Suite (full pop.)$720K/yr (5,000 × $12)$0 (defer to pilot validation)
Total (ex. M365 base)$1.67M/yr$433.5K/yr

*Indicative EA rates. Assumes M365 E3 base (Entra P1, Intune P1, MDE P1 included). Sentinel not included above — consumption-based, variable by organisation.

The $1.24M annual delta is not achieved by reducing security coverage. It is achieved by: (a) leveraging M365 E3 inclusions that the proposal ignored, (b) segmenting P2-tier licences to the populations that actually consume P2-tier features, (c) deferring the Entra Global Secure Access network layer until deployment feasibility is validated. The security outcome for the first four pillars is materially equivalent. The network pillar deployment is postponed rather than abandoned — to be activated when the organisation is operationally ready to deploy ZTNA at scale.

M365 E5 as a Zero Trust Bundle — Does It Make Sense?

Microsoft frequently positions M365 E5 as the licence that "enables Zero Trust" — and technically, E5 includes most of the premium tier security capabilities across the Zero Trust pillars: Entra ID P2, Defender for Endpoint P2, Defender for Office 365 P2, Defender for Identity, Defender for Cloud Apps, Purview E5 Compliance, and Microsoft Entra ID P2. The question is not whether E5 includes these capabilities. It is whether the organisation is deploying and operationally using them to justify the $35–$45/user/month E5 premium over E3 at EA rates.

For an organisation with a mature Microsoft security operations practice, an active SOC conducting EDR-based threat hunting, auto-labelling deployed across its information estate, and PIM implemented for privileged accounts — E5 delivers genuine Zero Trust capability at a consolidated price. For an organisation that upgraded to E5 based on a Zero Trust roadmap and is 18 months into deployment having activated 40% of the security capabilities — E5 is an expensive way to run Conditional Access and MFA. Our E5 security value analysis provides the deployment maturity framework for the E3 vs E5 Zero Trust decision.

Microsoft Sentinel in Zero Trust Architectures

Microsoft Sentinel serves as the SIEM/SOAR layer in the Zero Trust architecture — aggregating security signals from across the Defender suite, Entra ID, Intune, and Purview into a centralised investigation and response platform. Sentinel is consumption-based (priced per GB ingested), which makes it fundamentally different from the per-user products above: there is no "over-licencing" in the per-user sense, but there is significant over-commitment risk when organisations choose a Commitment Tier based on projected rather than measured data volumes.

The Zero Trust signal sources that feed Sentinel are not uniformly priced. M365 E5 users generate Entra ID sign-in logs, Microsoft Defender alerts, and M365 audit events that are ingested into Sentinel at zero marginal cost (covered by the E5 licence, not Sentinel billing). The incremental Sentinel billable volume comes from network device logs, third-party security tool outputs, and custom application telemetry. Establishing actual Sentinel ingestion volume requires running in PAYG mode for a minimum of 90 days before committing to a Commitment Tier. Organisations that commit to a Sentinel tier during the Zero Trust planning phase — before any data has flowed — consistently over-commit by 30–55%. See our Sentinel licensing cost guide for the Commitment Tier economics in full.

Three EA Negotiation Tactics for Zero Trust Licensing

1. Separate the Zero Trust Audit from the Renewal Proposal

Microsoft's field teams prefer to bundle the Zero Trust licensing discussion into the EA renewal conversation — where the time pressure of the renewal deadline limits the organisation's ability to critically evaluate each product line. Engage your Microsoft account team on Zero Trust licensing as a separate workstream, at least 9–12 months before renewal, and produce an independent gap analysis of what your current licences already provide vs what is genuinely incremental. The gap analysis output is your negotiating anchor. In most cases, the incremental Zero Trust spend required is 30–60% of the initial Microsoft proposal.

2. Challenge the Entra Global Secure Access Inclusion

As of 2026, Entra Internet Access and Private Access (the network pillar) are the least mature components of the Microsoft Zero Trust stack from an enterprise deployment perspective. Microsoft's proposals routinely include full-population Entra Suite licences as part of a Zero Trust architecture recommendation. Push back on this aggressively: require Microsoft to provide reference customers of comparable size who have deployed GSA to full production at scale, and make any GSA/Entra Suite commitment conditional on pilot success metrics rather than including it in the initial EA commitment at full-population price. This is a legitimate negotiating position — Microsoft cannot credibly argue that network-layer Zero Trust is operationally mature enough to justify full-population commitments without deployment evidence.

3. Use Zero Trust Deployment Roadmap as a Discount Lever

Microsoft's executive stakeholders respond strongly to structured Zero Trust deployment commitments — they report these to investors and regulators as security cloud adoption metrics. A documented Zero Trust deployment roadmap with specific milestones (Conditional Access for all users by Q2, PIM rollout by Q3, Sentinel PAYG to Commitment Tier by Q4 post-measurement) creates negotiating leverage for discounts on the premium-tier security products in the EA. The roadmap signals serious deployment intent — which is what the Microsoft field team needs to justify incremental discount authority to their management chain. Our EA negotiation tactics guide covers the deployment commitment anchor approach in full.

Zero Trust Licence Right-Sizing: Five-Step Plan

1. Map current M365 licence inclusions against every Zero Trust pillar — identify what you already own before adding any incremental licences.

2. Validate P2-tier deployment for Entra ID P2, Defender P2, and Purview P2 against actual feature activation data — segment to populations that consume P2 features.

3. Run Sentinel on PAYG for 90 days before committing to any Capacity Reservation — establish measured ingestion volumes with M365 data exclusions applied.

4. Defer Entra Global Secure Access to a conditional pilot commitment rather than full-population EA inclusion — validate deployment feasibility before the commercial commitment.

5. Present a Zero Trust deployment roadmap as a structured negotiating anchor — exchange milestone commitments for discount improvements on the incremental security add-ons.