From Zero Trust to the UN

From Zero Trust to the UN: The Cybersecurity Policy Trends Shaping International Relations

The doctrine that no user, device, or network should be trusted by default has migrated from enterprise IT architecture into the strategic posture of governments, alliances, and the international system itself. In 2026, Zero Trust is not merely a cybersecurity framework. It is the operating philosophy of an era.

By Vladimir Tsakanyan, PhD · Center for Cyber Diplomacy and International Security · cybercenter.space


On April 29, 2026, the Cybersecurity and Infrastructure Security Agency and its government partners published a guide to accelerating Zero Trust adoption in operational technology environments. The immediate context was explicit: CISA noted that threat actors like Volt Typhoon had been targeting OT systems to compromise, escalate, and maintain access within operational environments — and that Zero Trust architecture was critical to preventing the kind of cyber incidents that could cause operators to lose visibility or control of essential systems.

The publication was a technical document. Its implications were strategic. It established, in formal government guidance, that the foundational assumption of network security — that elements inside a defined perimeter can be trusted — had been invalidated by the systematic pre-positioning campaigns of state-sponsored actors in critical infrastructure across the United States and its allies. The perimeter is gone. The trust it conferred has been revoked. The doctrine that replaces it — never trust, always verify — is now the mandatory architecture for the systems that operate power grids, water treatment facilities, and industrial control networks.

What is true inside a network is increasingly true outside it. The same logic that drove the abandonment of perimeter-based trust in cybersecurity is reshaping the architecture of international relations, alliance management, and multilateral governance — at precisely the moment when the United Nations has launched its first permanent forum for cyber security, and the world’s most capable cyber power has published a strategy that treats international engagement as a projection surface rather than a collaborative framework. The policy trends shaping cybersecurity in 2026 are not confined to technical architecture. They are shaping the international order.


Zero Trust Becomes National Security Doctrine

The transition of Zero Trust from enterprise security framework to national security mandate has been building since Executive Order 14028 directed federal agencies to adopt Zero Trust principles in May 2021. In 2026, that transition is complete. The Department of Defense released its Zero Trust Implementation Guidelines in January 2026, specifying 91 activities across implementation phases for national security systems. The NSA published its Zero Trust Implementation Guideline Primer the same month, intended to assist the Defence Industrial Base and affiliated organisations. On March 30, 2026, the Director of National Intelligence confirmed that the Intelligence Community’s cyber modernisation programme — described as moving faster and more decisively than any previous administration — places Zero Trust architecture at its core, shifting security away from perimeter-based defences toward continuous verification of users and data regardless of location.

The global Zero Trust market is projected to exceed $78 billion by 2030. Gartner estimates that 81 percent of organisations plan to implement Zero Trust in 2026. IBM’s breach data confirms a measurable return: organisations with mature Zero Trust deployments saved an average of $1.76 million per breach compared to those without. These are enterprise metrics, but their drivers are geopolitical. The primary argument for Zero Trust adoption in 2026 is not efficiency or cost reduction. It is the documented reality of persistent state-sponsored intrusion into environments that perimeter security was assumed to protect.

The Volt Typhoon campaign — the systematic pre-positioning of Chinese state-linked actors in US critical infrastructure, maintained for months and in some cases years, specifically designed to enable disruption at a moment of geopolitical crisis — is the operational demonstration that made Zero Trust a national security imperative rather than an IT management preference. When threat actors with state resources and indefinite patience can achieve persistent access to the systems that operate power grids and water networks, the assumption that internal network traffic can be trusted is not a security posture. It is an exploitable vulnerability.

Analyst note

The extension of Zero Trust principles to operational technology environments — formalised in the April 29, 2026 CISA guidance — represents the most consequential expansion of the doctrine’s scope since its formulation. OT environments were historically isolated from internet-connected IT networks; their security was premised on physical separation rather than continuous verification. The documented convergence of IT and OT networks, driven by operational efficiency requirements and remote management capabilities, has dissolved this separation without replacing it with an equivalent security architecture. Applying Zero Trust principles to OT environments is technically more complex and operationally more constrained than enterprise IT — network visibility is limited, legacy systems cannot run modern authentication software, and operational continuity requirements constrain the maintenance windows available for security updates. The guidance acknowledges these constraints. It does not resolve them. The gap between the doctrine and its implementation in the environments most critical to national security remains the primary vulnerability.


The Philosophical Migration: Never Trust, Always Verify

The principle animating Zero Trust — never trust, always verify — has migrated beyond its technical context into the strategic calculus of governments managing alliances, technology partnerships, and multilateral commitments in an environment of unprecedented geopolitical volatility.

The WEF Global Cybersecurity Outlook 2026 documents this migration with precision: 91 percent of the largest organisations have changed their cybersecurity strategies in response to geopolitical volatility, and 64 percent are now accounting for geopolitically motivated cyberattacks in their overall risk mitigation strategy. The framing is significant. Geopolitical volatility — the shifting alignment of states, the uncertainty of alliances, the instrumentalisation of technology relationships — has become a primary driver of technical security architecture. The technical and the political are no longer separate domains to be managed by separate functions. They are a single strategic environment in which every access decision, every data sharing arrangement, and every infrastructure dependency is simultaneously a security decision and a diplomatic one.

The Swisscom Cybersecurity Threat Radar 2026 describes this convergence in operational terms: targeted attacks based on AI and professionalised state-sponsored actors have eroded traditional digital boundaries, transforming cybersecurity into a critical factor for strategic business success. The integration of hybrid threats — combining physical and digital aggression — represents a fundamental change in how organisations must assess risk. For the first time, the 2026 radar incorporated hybrid warfare as a category requiring explicit assessment, alongside the traditional threat domains of cybercrime and state-sponsored intrusion.

This convergence has produced a structural condition in which the technical decisions of security architects have direct implications for international relations, and the diplomatic decisions of foreign policy establishments have direct implications for technical security architecture. A government that mandates data localisation creates a compliance requirement that shapes the infrastructure investments of multinational technology companies. A government that deploys Zero Trust for its national security systems signals, to allies and adversaries alike, the degree of trust it extends to external parties accessing its networks. A government that applies export controls on semiconductor technology creates both a supply chain security measure and a diplomatic instrument — and the organisations in its jurisdiction must manage both dimensions simultaneously.


The Sovereignty Surge and Its Compliance Burden

The most operationally disruptive cybersecurity policy trend of 2026 for organisations operating across multiple jurisdictions is not a specific attack vector or a particular technology vulnerability. It is the simultaneous assertion of digital sovereignty by governments across the geopolitical spectrum, producing a regulatory environment of extraordinary complexity and strategic fragmentation.

Data localisation requirements — mandating that data generated within a jurisdiction be stored and processed within that jurisdiction — have proliferated across more than 100 countries. These requirements reflect a coherent strategic logic: if data generated by a government’s citizens, enterprises, or agencies is stored on infrastructure in foreign jurisdictions, it may be accessible to foreign intelligence services, subject to foreign legal process, or vulnerable to disruption through infrastructure denial during periods of geopolitical tension. Localisation addresses all three concerns simultaneously, at the cost of the efficiency, redundancy, and cost advantages that distributed global cloud infrastructure provides.

Mandatory vulnerability disclosure requirements represent a different dimension of the same sovereign assertion: governments demanding that organisations operating in their jurisdiction report software vulnerabilities within specified timeframes, creating a disclosure architecture that serves national cyber threat intelligence functions but that may simultaneously expose information to adversarial state intelligence services monitoring the same disclosure channels. The EU’s NIS2 Directive, China’s cybersecurity vulnerability disclosure regulations, and the US CISA reporting requirements each reflect similar sovereign objectives through different regulatory mechanisms — and a multinational organisation subject to all three must manage disclosures that are simultaneously required, potentially conflicting, and geopolitically sensitive.

The WEF assessment frames the aggregate effect precisely: sovereignty-driven regulations diverge across jurisdictions, creating a complex patchwork of compliance that adds operational friction and strategic risk for multinational companies. The organisations navigating this patchwork are not merely managing compliance costs. They are managing the intersection of technical security requirements, legal obligations, and the diplomatic positions of the governments whose regulations apply to them — a set of considerations that no compliance function designed for a pre-geopolitical-volatility environment was built to handle.

Analyst note

The sovereignty regulation surge has a specific and underexamined implication for the Pax Silica framework and equivalent technology alliance architectures. A multilateral supply chain partnership premised on trusted technology ecosystems and shared infrastructure must navigate the divergent data localisation, vulnerability disclosure, and security certification requirements of its member jurisdictions — requirements that were designed for national security objectives and that may, in their interaction, create compliance conflicts within the alliance itself. The technical architecture of trusted supply chains does not resolve the regulatory architecture of sovereign digital control. Both must be managed simultaneously, and the mechanisms for doing so do not yet exist at the multilateral level.


The UN Global Mechanism: Architecture of a Permanent Forum

Against this backdrop of domestic policy acceleration and geopolitical fragmentation, the United Nations launched the most significant institutional development in international cyber governance in two decades. The Global Mechanism on Developments in the Field of ICTs in the Context of International Security and Advancing Responsible State Behaviour in the Use of ICTs held its organisational session on March 30-31, 2026 — the first permanent UN forum dedicated to cyber security, succeeding the Open-Ended Working Group process that had operated since 2019.

The mechanism’s establishment represents a genuine institutional achievement. All 193 UN member states agreed, through the OEWG final report and subsequent General Assembly resolution, to a single-track permanent forum — ending the parallel process competition between Western and Russian-Chinese procedural preferences that had complicated the OEWG’s work throughout its mandate. Ambassador Egriselda López of El Salvador was elected chair for the 2026-2027 biennium, with the Russian Federation notably choosing not to block the consensus appointment — a signal of the diplomatic investment that major powers, across their differences, have made in the mechanism’s launch.

The mechanism’s substantive agenda inherits the five pillars of the framework for responsible state behaviour in cyberspace: existing threats, international law, norms, confidence-building measures, and capacity development. Its procedural architecture includes a first substantive plenary session scheduled for July 2026 and dedicated thematic group meetings for December 2026 — a timeline that, if maintained, would make 2026 the most intensive year of multilateral cyber norm development since the GGE process produced its foundational reports.

The regional priorities articulated at the organisational session are telling. Nigeria, speaking for the African Group, highlighted capacity development as a cross-cutting priority and pointed to cybersecurity threats affecting developing countries, including ransomware and critical infrastructure attacks. The Pacific Islands Forum, through the Solomon Islands, emphasised the vulnerabilities of Small Island Developing States. The Arab Group and the European Union underscored the importance of implementation — building on existing agreements rather than reopening foundational debates. The distribution of emphasis reflects the cyber equity abyss documented in the WEF data: the states most exposed to cyber threats are, in many cases, the states with the least capacity to defend against them and the most urgent need for a governance framework that provides practical support rather than declaratory commitments.


The Implementation Gap and the Norm Erosion Problem

The Global Mechanism’s transition from the OEWG carries both the achievements of the predecessor process and its unresolved tensions. The framework for responsible state behaviour — comprising eleven voluntary, non-binding norms agreed by consensus — represents the most broadly accepted international agreement on state conduct in cyberspace. It has been endorsed, at least formally, by all UN member states. Its implementation, measured against the documented pattern of state-sponsored cyber operations, is a different matter.

The states most vocal in advocating for the framework’s norms are, in documented cases, also the states whose intelligence services conduct the operations the norms prohibit. The norms against attacking critical infrastructure, interfering with computer emergency response teams, and allowing one’s territory to be used for internationally wrongful cyber acts coexist with the documented reality of exactly these activities conducted by states that have endorsed them. The OEWG process produced no enforcement mechanism, no compliance assessment framework, and no consequence architecture for violations — by design, because any such mechanism would have required the endorsement of the states most motivated to resist it.

The Global Mechanism faces the same structural constraint. Its consensus-based operation provides broad legitimacy at the cost of the binding commitments and verification mechanisms that would give its norms operational force. The UNIDIR Cyber Stability Conference 2026, held last week, identified the mechanism’s core challenge precisely: how to futureproof norms and international law in an environment where technological change — AI agents, quantum computing, autonomous cyber weapons — is outpacing the governance frameworks designed to constrain it.

The Trump administration’s seven-page Cyber Strategy, released in March 2026, does not engage this challenge. It treats multilateral cyber governance as a domain for asserting positions rather than building frameworks, names no adversaries and no international commitments, and explicitly prioritises offensive capability and private sector mobilisation over the norm-based approach that the Global Mechanism is designed to advance. The world’s most capable cyber power has, at the moment of the mechanism’s launch, reduced its multilateral engagement posture — creating a governance environment in which the states most invested in weakening international norms are the most active participants in the process that might otherwise constrain them.


AI, Quantum, and the Governance Horizon

The UNIDIR Cyber Stability Conference identified three technological developments requiring the Global Mechanism’s sustained attention: AI agents, quantum computing, and the rapidly evolving ICT threat landscape they are collectively generating. The intersection of these developments with the existing governance framework presents challenges that the mechanism’s current architecture is not equipped to address within its current procedural timeline.

AI’s impact on cyber operations has been documented extensively in 2026: autonomous agents capable of executing multi-stage attack campaigns without human intervention, large language models used to refine spearphishing at scale, AI-generated synthetic evidence deployed to mislead forensic investigators, and the compression of attack-to-impact timelines to intervals that human defensive response cannot match. The existing norms framework makes no reference to AI-enabled cyber operations, because the framework was developed before AI capability reached operationally relevant levels. Updating the framework to address autonomous agents requires consensus among states that are simultaneously racing to deploy those agents — a negotiating environment of structural tension between operational interest and governance commitment.

Quantum computing’s implications for the cryptographic infrastructure underpinning all secure communications — including the secure communications through which the Global Mechanism’s member states conduct their diplomatic correspondence — add a temporal urgency to the governance agenda that the mechanism’s annual plenary and biennial thematic group schedule does not match. If Q-Day arrives within the mechanism’s current mandate period, as multiple credible assessments suggest is plausible, the governance framework will need to address the simultaneous decryption of years of archived diplomatic and military communications — a scenario for which no governance response has been prepared.

The ICT threat landscape’s acceleration, measured by the 103 percent surge in maritime cyber incidents, the doubling of AI-enabled attack capability documented since 2024, and the first confirmed kinetic strikes on commercial cloud infrastructure in March 2026, is outpacing governance response at every institutional level. The Global Mechanism convenes its first substantive plenary in July 2026. The threat environment it is designed to govern will, by that date, have evolved materially from the environment that informed its mandate.

Analyst note

The governance horizon problem — the structural lag between threat evolution and governance response — is not a failure of the Global Mechanism specifically. It is a feature of consensus-based multilateral governance applied to a domain where the pace of technological change is determined by private sector innovation and state competition rather than by the schedule of UN committee meetings. The OEWG produced its first agreed framework elements in 2021, five years after its predecessor process had produced its foundational report. The threats addressed in that framework had been operationally active for a decade before they were formally acknowledged in multilateral agreement. At current rates of technological change, the gap between operational reality and governance framework is not closing. It is widening, and the width of that gap is the space in which the most consequential and least-governed cyber operations are conducted.


The CISO as Geopolitical Actor

The convergence of domestic cybersecurity policy and international relations has produced an organisational consequence that the WEF’s February 2026 assessment articulates with unusual directness: every Chief Information Security Officer is now effectively a geopolitical actor.

This is not hyperbole. A CISO managing a multinational organisation’s cybersecurity programme in 2026 must simultaneously comply with data localisation requirements that reflect sovereign digital control assertions across multiple jurisdictions; navigate export control frameworks that determine which technologies can be deployed in which markets; assess cyber risk in the context of geopolitical volatility that may escalate from diplomatic tension to destructive cyber operation without a predictable threshold; manage supply chain dependencies whose security posture is a function of the geopolitical relationships between the states in whose territory the supply chain operates; and maintain the organisation’s Zero Trust architecture against threat actors whose operational priorities are set by the strategic objectives of state intelligence services.

None of these functions falls within the traditional scope of enterprise security management. All of them are now unavoidable dimensions of the CISO’s operational responsibility. The organisational response — the elevation of cybersecurity from a supporting IT function to a strategic business and national security imperative, documented at the WEF’s Annual Meeting on Cybersecurity 2026 in Geneva — reflects the recognition that the separation between technical security management and geopolitical risk assessment is no longer sustainable.

The policy response at the national level reflects the same recognition. Zero Trust mandates for critical infrastructure. Post-quantum cryptography migration deadlines. Sovereign AI infrastructure requirements. Data localisation regulations. Vulnerability disclosure obligations. Each of these policy instruments translates a geopolitical risk assessment into a technical compliance requirement — and each requires CISOs to implement, in their organisations’ infrastructure, the security architecture that their governments have determined is necessary for national resilience in a contested digital environment.


Bottom Line Assessment

The cybersecurity policy landscape of 2026 is defined by the convergence of three concurrent transitions, each of which is reshaping international relations in ways that no single governance framework is currently equipped to manage.

The first is the domestic policy transition from perimeter-based to Zero Trust security architecture — a shift driven by the documented failure of perimeter defences against state-sponsored persistent access campaigns, formalised in mandatory guidance for national security systems, and extending from enterprise IT into the operational technology environments that govern critical infrastructure. The technical implications of this transition are significant. Its strategic implications — the signal it sends about the degree of trust that states extend to entities accessing their most sensitive systems — are at least equally significant.

The second is the sovereignty regulation surge — the simultaneous assertion of digital control by governments across the geopolitical spectrum, producing a compliance environment of extraordinary complexity for multinational organisations and a structural tension between the efficiency logic of integrated global digital infrastructure and the security logic of sovereign digital control. This tension is not being resolved. It is intensifying, as each geopolitical friction point produces a new regulatory response that adds to the compliance burden and narrows the space for the kind of integrated digital infrastructure on which both economic efficiency and collective security depend.

The third is the multilateral governance transition — the launch of the UN Global Mechanism as the first permanent forum for international cyber security, at a moment when the state most central to the viability of the multilateral approach has reduced its multilateral engagement posture, the threats the mechanism is designed to govern are evolving faster than its procedural timeline, and the gap between the norms it is designed to advance and the operational reality of state behaviour in cyberspace is wider than at any point in the governance process’s history.

These three transitions are not proceeding in parallel. They are interacting — the technical architecture of Zero Trust shapes the diplomatic architecture of alliance trust; the sovereignty regulation surge constrains the multilateral cooperation that the governance transition requires; the governance mechanism’s procedural pace is determined by the political constraints of consensus-based multilateralism in an environment where the major powers are simultaneously building the most capable offensive cyber forces in history.

The policy trends shaping cybersecurity in 2026 are not, ultimately, about cybersecurity. They are about the architecture of trust — technical, diplomatic, and institutional — in a world that has concluded, by the weight of operational experience, that the perimeter cannot be trusted and that verification must be continuous.

Never trust, always verify is no longer a network security principle. It is the operating doctrine of the international system.


Zero Trust · UN Global Mechanism · Cybersecurity Policy · International Relations · Digital Sovereignty · CISA · Cyber Norms · Geopolitics · AI · Quantum Computing · Vladimir Tsakanyan


Discover more from Center for Cyber Diplomacy and International Security

Subscribe to get the latest posts sent to your email.


Comments

Leave a comment

Discover more from Center for Cyber Diplomacy and International Security

Subscribe now to keep reading and get access to the full archive.

Continue reading