Post-Breach Remediation: Implementing "Zero Trust" Architecture for a High-Prestige Law Firm
Secured a prestigious law firm following a major phishing breach by implementing automated governance, geo-fencing, and strict access controls
Project Overview
Role
Security Consultant / Engineer
Industry
Legal / High-Prestige Services
Environment
M365, SharePoint Online, Entra ID
Tech Stack
PnP PowerShell, Power Automate, Conditional Access, Azure VPN, Mimecast
The Mission
The Mission: Secure a prestigious law firm following a major phishing breach targeting a Director.
The Catch: An environment running on the "Honor System," where Partners had unrestricted access to all client data, and "Ghost" external users lurked in file shares.
The Solution: A complete restructure of Information Governance using PnP PowerShell, Power Automate, and Entra ID Conditional Access to enforce a strict "Need-to-Know" model.
Key Outcomes
- Automated "Client-Partner" permissions eliminating manual access errors
- 100% Geo-Fencing with strict location-based access controls
- Elimination of external risk through ghost user purge
- Regulatory compliance achieved with auditable "Least Privilege" model
The Challenge: The "Honor System" Failure
I was brought in after a Director was phished, resulting in a mass-email event. While an MSP had performed "First Aid" (password resets), the underlying architecture was critically vulnerable.
The Audit revealed three major risks:
- The "Honor System" Security: There was no technical segregation of data. All Partners had access to all client files. The firm relied on Partners simply "agreeing" not to look at cases they weren't working on.
- Ghost Users: I discovered multiple SharePoint subfolders shared with external personal email addresses that current staff could not identify—a massive data leak risk.
- Audit Blindness: Permissions were assigned manually and sporadically. There was no way to prove who had access to what for compliance.
This "Honor System" approach was fundamentally incompatible with modern security requirements and regulatory compliance. The breach exposed the critical vulnerability: when trust is the only security control, a single compromised account can access everything.
The Solution: Code-Based Governance
I implemented a strict policy: "Manual Permissions are Forbidden." Access must be dictated by identity, not human favor.
Pillar 1: Dynamic Client Access (The Technical Win)
The challenge was allowing Partners access only to their specific clients without burdening IT.
Architecture: I broke permission inheritance on the "Clients" document library.
The Automation: I created a SharePoint "Master List" mapping Partners to their specific Client Cases.
The Scripting: I built a Power Automate flow triggered by this list. When a Partner was assigned a case, the flow triggered a PnP PowerShell script to dynamically inject that user's permissions onto the specific folder.
Result: Compliance became automatic. If a Partner isn't on the list, they cannot see the files.
This eliminated human error entirely. No engineer could accidentally grant access to the wrong confidential folder—the system enforced access based solely on the Master List.
Pillar 2: The Fortress (Entra ID Conditional Access)
To prevent future breaches, we locked the front door using Context-Aware Access.
- Geo-Fencing: Implemented strict policies blocking all logins from high-risk nations (Russia/China). Standard users were locked to the UK only.
- The "Travel Protocol": Created a managed group for Partners travelling abroad, enforcing strict session limits and MFA requirements while outside the UK.
- VIP Protection (Azure VPN): For the most sensitive Directors, we configured an Azure VPN Gateway. Conditional Access was configured to only allow their logins if they originated from the specific static IP of the VPN.
- Device Trust: Strictly blocked BYOD. Only managed, compliant devices could access firm data.
This multi-layered approach created defense-in-depth: even if credentials were compromised, location, device, and network context would prevent unauthorized access.
Pillar 3: Email Hardening (Mimecast)
Deployed Mimecast Cloud integrated via Entra Enterprise Apps.
Worked directly with the CEO and Partners to fine-tune the "aggression level" of the filtering, balancing security with the reality of their high-volume workflows.
This collaborative approach ensured that security controls didn't break business operations while still providing robust protection against phishing and malicious emails.
The Results
Project Results Summary
Data Sovereignty Secured
External "Ghost" users were purged, and external sharing was locked down to specific domains. The firm now had complete visibility and control over who could access sensitive client data.
Regulatory Compliance
The firm moved from non-compliant "Open Access" to a strict, auditable "Least Privilege" model. Every access decision was now traceable, with automated logs proving who had access to what and when.
Human Error Eliminated
By automating permissions via Power Automate and PnP, the risk of an engineer accidentally granting access to the wrong confidential folder was removed entirely. The system enforced access based on identity and role, not manual configuration.
Access Control
100%
Automated Client-Partner permissions
Geo-Fencing
100%
Location-based access restrictions
External Risk
0
Ghost users eliminated
Compliance
100%
Auditable Least Privilege model
Key Takeaways
Success Factors:
- Code-based governance: eliminating manual permissions removed human error
- Context-aware access: location, device, and network controls created defense-in-depth
- Collaborative security: working with leadership ensured controls didn't break workflows
- Automated compliance: every access decision was traceable and auditable
Technical Innovation:
- Power Automate + PnP PowerShell integration for dynamic permission management
- SharePoint Master List as single source of truth for access control
- Multi-tier Conditional Access policies with VIP protection via Azure VPN
- Mimecast integration for advanced email security without workflow disruption
This case study demonstrates how Zero Trust architecture can be implemented in high-stakes environments where trust-based security models have failed. By moving from "Honor System" to code-based governance, the firm achieved both security and compliance without sacrificing operational efficiency.
Is Your Sensitive Data Protected by Technology, or Just the "Honor System"?
I build automated governance structures that secure data without breaking workflows. Let's discuss your security and compliance requirements.
Why Choose Sentryn?
Proven Security Expertise
Successfully implemented Zero Trust architecture for high-prestige law firms, achieving 100% compliance and eliminating security vulnerabilities.
Automated Governance
Code-based access control eliminates human error and ensures auditable compliance with regulatory requirements.
Workflow Integration
Security controls that protect data without breaking business operations, designed in collaboration with leadership.