The breach began with one forgotten API key. By the time anyone noticed, lateral movement was already in progress.
This is why Infrastructure-as-a-Service demands more than firewalls and IAM roles. The modern threat model does not trust networks. It does not trust devices. It does not trust users without proof. Zero Trust Access Control for IaaS is not a theory or an option. It is the operational baseline.
Zero Trust in IaaS starts with identity at the core. Every request to infrastructure must prove who is making it, what they can do, and why they are allowed. Credentials are short-lived, scoped to exact permissions, and issued only after strong authentication. Once granted, they expire fast. Attackers lose their window before it opens wide.
Access control must extend down every layer: consoles, APIs, CLI, automation scripts. No static keys sitting in code. No overprivileged service accounts hidden in CI/CD pipelines. Policies must bind identity, context, and action. This means tying every login to device posture, geolocation, time, and role. Grant access to what is needed now—deny everything else by default.