In January 2026, the National Security Agency released its first Zero Trust Implementation Guidelines (ZIGs). Their aim was to do something prior guidance intentionally avoided: move Zero Trust from architectural alignment to operational execution.
That timing matters. Zero Trust has been a framework for years and rightly so. Like a quality standard, it is designed to evolve. The same tools, techniques, and skills shaping modern cyber defense are available to both friend and foe. That reality guarantees one thing: Zero Trust cannot be static. It must be continuously exercised, refined, and enforced.
For context, earlier Zero Trust guidance was deliberately non-prescriptive. At the time, the community was still standardizing vernacular, defining architectural pillars, and building early adoption momentum. That flexibility allowed agencies to experiment, share lessons learned, and mature practices—creating the conditions necessary for operational execution guidance to now be both credible and actionable.
What the ZIGs make clear is that Zero Trust has crossed a threshold. The challenge is no longer defining the pillars. The challenge is running them across tools, teams, and environments… every day.
This is where government organizations realize intelligent workflows - securely scaling AI and automation - stop being just helpful, and become essential.
From controls to coordination
The most important signal in the ZIGs is not a new control or capability. The assumption is that organizations can already coordinate action across systems.
Across identity, devices, applications, data, and visibility, the ZIGs depend on:
Correlating telemetry from multiple sources
Applying policy decisions consistently
Acting quickly without breaking governance
Preserving auditability and human accountability
In other words, operators can’t think of Zero Trust at scale as a tooling problem. It is an execution problem.
And that is precisely where Tines stands apart.
Why intelligent workflows matter now
The release of the ZIGs makes something clear: Zero Trust is no longer about assembling the right controls. It’s about whether those controls can operate together, governably, and at speed.
That is not a tooling problem.
That is an execution problem.
And execution is a workflow discipline.
Tines did not start as a traditional SOAR vendor. It started as an API-native automation platform built to remove friction between systems. It was accessible and vendor-agnostic by design. It earned credibility in security operations because it simplified complexity, not because it tried to replace it.
Over time, the market labeled it “SOAR.” But at its core , Tines has always been something more foundational: an orchestration layer that connects systems without owning the data, without enforcing lock-in, and without dictating architecture.
That origin matters in a Zero Trust world.
Long before Zero Trust became federal doctrine, Tines was already architecturally aligned with it:
Stateless execution
API-first integration
Policy-driven workflow logic
Human approval gates where risk demands it
No embedded control-plane dependency
In other words, it was Zero Trust-friendly before Zero Trust was codified.
From automation to intelligent workflows
As Zero Trust matured from theory to operational mandate, the expectations changed.
It was no longer enough to automate ticketing or isolate endpoints. Organizations needed to:
Correlate identity, device posture, and telemetry in real time
Enforce contextual access policies dynamically
Maintain auditability across distributed decisions
Introduce AI-driven enrichment without surrendering control
This is where Tines evolved from simply orchestration and automation to intelligent workflows.
Intelligent workflows are not about autonomy for its own sake. They allow organizations to mature deliberately:
Deterministic workflows first — repeatable, policy-aligned execution
Human-led control where required — structured approvals and risk gates
Agentic AI applied progressively — bounded intelligence layered in as trust and governance mature
That progression mirrors how Zero Trust itself matures. Foundational enforcement first, contextual intelligence next, and adaptive refinement when appropriate.
The ZIGs assume this execution fabric exists, particularly as organizations move toward more advanced orchestration, enrichment, and response integration.
Governance is not an add-on
Automation without governance is just speed without control.
Because Tines was founded by security practitioners, governance was never optional. It was foundational.
Every workflow is observable.
Every execution is logged.
Every decision path is traceable.
Every action can be gated, approved, escalated, or rolled back.
That is not a feature checklist. That is operational discipline.
As Zero Trust enforcement becomes continuous rather than periodic, auditability becomes the difference between confidence and exposure. The ZIGs elevate orchestration — but orchestration without governance introduces new risk. Tines was built to avoid that tradeoff.
Vendor-agnostic means zero lock-in
Zero Trust does not live in one vendor stack, and it never will.
Identity systems, endpoint platforms, network controls, data classification engines… these environments are heterogeneous by necessity. The ZIGs reflect that reality.
Tines operates on a simple principle: If a tool has an API, it can be orchestrated.
This is core to the architecture of the platform.
It means no rip-and-replace.
No control-plane consolidation pressure.
No forced dependency on a single ecosystem.
It means Zero Trust workflows can be implemented across existing investments immediately.
Time to value is a security multiplier
The most overlooked advantage in Zero Trust is speed, not deployment speed alone, but learning speed.
Zero Trust is iterative. Threats evolve. Standards evolve. Policies mature.
Tines creates an environment where teams can build quickly, observe outcomes, refine logic, and reuse patterns across the enterprise. That practice model reinforces critical thinking. It builds institutional muscle memory.
In a world where adversaries have access to the same AI tooling as defenders, the ability to continuously refine execution becomes a strategic advantage.
Always Zero Trust–enabled. Now more powerful.
Tines did not pivot toward Zero Trust. It has always aligned to it. What has changed is the depth in capability.
With AI-powered enrichment, contextual reasoning, and agentic execution layered onto a governance-first foundation, intelligent workflows allow organizations to move beyond foundational enforcement into advanced Zero Trust operating models, without sacrificing control.
Frameworks define direction.
Guidelines define expectations.
Intelligent workflows make it operational.
That is the difference between aligning to Zero Trust and running it.
Where this shows up in practice
In mature environments, intelligent workflows begin with disciplined, repeatable security execution. Across public-sector use cases shared by Tines customers, several patterns repeat:
Automating cybersecurity processes and standards that perform triage and enrichment
Automating response actions across EDR, IAM, and ticketing systems
Investigating threats for policy-aligned containment and remediation
Orchestrating identity lifecycle enforcement tied to posture and behavior
Enriching access decisions with contextual intelligence before enforcement
Standardizing Zero Trust workflows so they can be reused, audited, and improved
What distinguishes these use cases is not the presence of automation. It is standardized execution. Zero Trust requires repeatability. If enforcement decisions vary by team, environment, or operator, trust assumptions creep back in.
This is precisely where intelligent workflows create structural advantage. Instead of replacing identity tools, endpoint platforms, or analytics engines, they bind them into deterministic execution models.
Over the past year, senior defense officials have consistently reinforced this shift. DoD leadership has emphasized that Zero Trust must be an operational imperative requiring automation at scale, continuous enforcement, and measurable outcomes across the enterprise. The focus has moved from framework alignment to runtime execution.
That shift aligns directly with the ZIGs’ tone and structure. Automation, orchestration, analytics, and workflow standardization are assumed capabilities rather than presented as feature enhancements.
And that assumption is the inflection point.
When Zero Trust moves from conceptual alignment to continuous enforcement, execution discipline becomes the differentiator. Intelligent workflows are what make that discipline sustainable.
Take these workflows from the Tines Library, for example

Auto assign restricted sensitivity label to OneDrive documents using Cyera
Process security issues from Cyera and apply appropriate sensitivity labels to data objects in Microsoft OneDrive. Identify matching policies, retrieve user information from Entra, and assign labels to ensure proper data protection.
Tools
Community author
Harrison Rosen


Invalidate authentication sessions for a user in Azure Entra ID
Invalidate all authenticated sessions for a user in Azure Entra ID to help protect against compromised session cookies remaining valid after accounts are suspended or passwords are changed.
Tools
Created by
What the shift really means
The ZIGs do not redefine Zero Trust. They raise expectations.
They assume:
Automation exists
Workflows connect systems
Policies are enforced consistently
Humans remain accountable
That combination reflects an understanding that Zero Trust only works when execution keeps pace with intent.
The expected impact is tangible: reduced dwfewer privilege escalations, accelerated incident response cycles, improved audit fidelity, and demonstrable policy adherence across pillars. Zero Trust in an operational state means controls are continuously validated, enforcement is observable, and decisions are policy-driven rather than situational.
In short, operational Zero Trust is, for the first time, about making controls continuous, measurable, and enforceable at scale. This is what Tines does.
Closing thought
Zero Trust has matured past the question of what it should be. The question now is whether organizations can run it reliably across time, tools, and adversary pressure.
Frameworks define direction.
Guidelines define expectations.
Intelligent workflows deliver outcomes.
This is where Tines becomes foundational, not optional. Zero Trust fails not because of missing controls, but because those controls do not operate together consistently. Tines weaves Zero Trust into the operational fabric of the enterprise by connecting identity systems, endpoint telemetry, policy engines, data controls, and response actions into governed, observable workflows. Deterministic where precision is required. Human-led where risk demands oversight. Agentic where intelligence accelerates decision-making without sacrificing control.
Because Tines is vendor-agnostic, it activates architecture as opposed to disrupting it. Because it was born in security operations, governance and auditability are inherent, not layered on. And because it enables teams to build, test, refine, and reuse workflows quickly, Zero Trust becomes iterative and sustainable rather than aspirational.
The future of Zero Trust will not be defined by diagrams. It will be defined by execution. Organizations that embed intelligent workflows at the core of their Zero Trust architecture will transcend not by complying with the standard, but instead operationalizing it, continuously improving on it, and ultimately outpacing adversaries with it.