Cyber Security

Designing for Resilience: Building Zero-Trust UX Patterns That Keep Security on Brand

Cybersecurity threats, such as phishing (fraudulent emails or messages), vishing (voice-based phishing attacks) and baiting (offering products for free to trick users into downloading malware), are spreading and evolving faster than organisations can react.

In this case, Zero-Trust UX is needed. According to Caleb Uzuegbunam, Head of Design at Kenley, this approach bridges the gap between strict security frameworks and the everyday user experience. 

Zero-Trust’s philosophy 

Zero-Trust is usually called a network security model: “Never trust, always verify”. However, the expert suggests that this philosophy should also consider the role of users. “A flawed authentication or permission control can do more harm than good. Users will likely bypass it, which damages the trust in the product”, he explains. 

The friction paradox 

Fully embracing the Zero-Trust philosophy is not always straightforward. Caleb points to the “friction paradox” in security UX: “Accessing the product shouldn’t be too easy or too difficult – the first is insecure, and the latter is annoying. Finding the right balance between security and user experience is necessary”, he says. 

For instance, embedding a complex multi-step authentication verification might seem safe. However, there is an issue: this high difficulty level can also lead to risky behaviours, such as saving credentials in insecure notes for faster access. Conversely, configuring only a simple biometric login without any step-up authentication in precarious situations may leave an entry point open. 

Principles of Zero-Trust UX design 

Based on significant experience in creating secure systems for organisations, Caleb outlines his main guiding principles: 

  1. “Don’t ask for more than is needed”. If a user’s device, location, and behaviour are consistent with the past actions, allow low-friction access. Only if something changes (such as a new device or unexpected geolocation), set up more advanced verification.
  2. “Explain why an extra verification is needed”. Users will comply with multi-layered authentication if they understand the reason. Therefore, it is more beneficial to surface a message such as “We noticed a login attempt from a new location” rather than a mere “Verification required.” 
  3. “Use your brand’s tone and visuals”. Security touchpoints are an integral part of your product’s design, and a generic warning screen might feel out of place in the rest of the experience. Instead, maintain your style even in the most serious verification steps. 
  4. “Give users a choice“. Offer verification through multiple secure channels, such as app push notifications, hardware tokens, or biometrics, so that they can choose their most convenient secure method. 
  5. “Minimise cognitive load”. This implies avoiding jargon and indicating the progress of authentication (for example, displaying the remaining steps). Users feel in control if they understand what is happening and what is next. 

Keeping security human-friendly 

Zero-Trust policies can sound rigid. Nevertheless, Caleb highlights that human factors are the priority. “Imagine the authentication process guiding you through a stressful moment. Every measure needs to be tested for user comprehension”. 

To make authentication human-friendly, the expert suggested using friendly confirmations after the process (“You’re all set – your account is now secure!”) and providing clear fallback options if a method fails (biometric authentication fails – showing the message “Use password instead”). 

Brand association 

Some companies see security as a compliance checkbox. However, Caleb believes a well-thought-out Zero-Trust design strategy can improve brand image: “They will associate the brand with safety and care, which is especially important in fintech, healthcare, and enterprise SaaS”. 

For example, Wise creates an authentication flow with user convenience as the priority. The mobile version enables quick access through biometric authentication. The app also minimises friction through auto-lock by allowing passcode or biometric unlock instead of prompting passwords. Finally, Wise provides different fallback options, such as email, password, or alternative 2SV methods when needed. 

Integrating resilience into the development cycle 

Zero-Trust is a framework that needs to be integrated into the product lifecycle to align security requirements with the design decisions. “Collaboration between security engineers and UX designers is very beneficial when planning the product,” the expert points out. 

To accomplish successful integration, Caleb suggested stress-testing flows to mitigate potential user confusion, tracking completion rates of multi-factor authentication (MFA) flows, and adjusting them as user behaviour changes or new types of threats emerge. For example, AI-related ones are on the rise, hence organisations should adapt their authentication processes to address these evolving risks.

Due to the rise of generative AI, new attack vectors are surfacing from prompt injection to data leakage through model interactions. Caleb stresses that Zero-Trust UX patterns are equally critical in AI-powered systems. For instance, enterprise AI tools should not only authenticate user access but also contextualize permissions and limit what sensitive data an AI system can surface or generate based on the user’s verified role. Just as with traditional flows, transparency matters: surfacing clear explanations such as “This data is restricted due to compliance policies can prevent misuse while maintaining user trust. Integrating these principles ensures that AI adoption in enterprises does not outpace the safeguards that keep them resilient.

Conclusion

Resilience today means creating systems and experiences that make hacker attacks harder in the first place, without alienating the people for whom those systems are built. “Zero-Trust is about trusting the process you’ve built, knowing it works under pressure and still feels like your product,” Caleb concluded.

 

Author

  • I'm Erika Balla, a Hungarian from Romania with a passion for both graphic design and content writing. After completing my studies in graphic design, I discovered my second passion in content writing, particularly in crafting well-researched, technical articles. I find joy in dedicating hours to reading magazines and collecting materials that fuel the creation of my articles. What sets me apart is my love for precision and aesthetics. I strive to deliver high-quality content that not only educates but also engages readers with its visual appeal.

    View all posts

Related Articles

Back to top button