LEGO Prompt Cards: Zero Trust Workshop
- Monie Thomas
- Aug 11
- 3 min read
Updated: Oct 24

đ
Identity Management
Build Prompt:
âUse LEGO bricks to show how access is granted today. Who controls it? How do users get in?â
Reflection Questions:
âWhere are we still relying on trust by default?â
âWhat would a secure, verified access model look like?â
âHow do contractors and field teams fit into this model?â
đ§ą Network Segmentation
Build Prompt:
âCreate a model of how systems are connected across IT and OT. Where are the weak points?â
Reflection Questions:
âWhich systems are exposed to lateral movement?â
âWhere do we need stronger boundaries or microsegments?â
âWhat does a resilient, segmented network look like?â
đ§ Behavior Change
Build Prompt:
âBuild a scene showing how secure behavior is taught and reinforced in your team.â
Reflection Questions:
âWhat behaviors are visible in your model?â
âWhere does training break down or get ignored?â
âWhat would help people apply secure habits consistently?â
đ¨ Incident Response
Build Prompt:
âModel how a cyber threat is detected and escalated. Whoâs involved? What happens next?â
Reflection Questions:
âWhere does confusion or delay happen?â
âHow do people know what to do?â
âWhat would a fast, coordinated response look like?â
đ§ Bonus Card: Future State Vision
Build Prompt:
âUsing any bricks, build your vision of a Zero Trust organizationâwhat does it look like physically?â
Reflection Questions:
âWhatâs different from todayâs model?â
âWhat behaviors, systems, or roles are central?â
âWhat would it take to get there?â
Round 1: Identity & Access Management
đ§ą Step 1: As-Is Build
Participant Build:
A tall, narrow LEGO tower with one door and a single key at the base. Explanation:Â Â âThis represents our centralized identity system. Everyone uses the same credentials to access multiple systems.â
đŁ Step 2: Share & Reflect
Prompt Response:
âWeâre still relying on implicit trustâonce someoneâs inside, they can access everything.â âThereâs no MFA for internal apps, and contractors get the same access as full-time staff.â
đ§ Step 3: Future State Build
Participant Build:
Multiple smaller towers connected by bridges, each with its own colored key. Explanation:Â Â âWeâve segmented access by role and added verification gates. Contractors only access what they need.â
đ Step 4: Group Debrief
Flip Chart Insights:
Barriers:Â Legacy systems, lack of role clarity
Enablers:Â MFA rollout, identity governance tools
Ownership:Â IAM team, HR for role definitions
đ Round 2: Network Segmentation
đ§ą Step 1: As-Is Build
Participant Build:
A flat LEGO base with all systems connected by a single line. Explanation:Â Â âOur network is flatâonce inside, attackers can move laterally.â
đŁ Step 2: Share & Reflect
Prompt Response:
âWe trust internal traffic too much. Thereâs no segmentation between IT and OT.â
đ§ Step 3: Future State Build
Participant Build:
Segmented zones with colored walls and monitored gateways. Explanation:Â Â âWeâve created microsegments with inspection points. Each zone has its own access rules.â
đ Step 4: Group Debrief
Flip Chart Insights:
Barriers:Â Legacy infrastructure, lack of visibility
Enablers:Â Network monitoring, firewall upgrades
Ownership:Â Network team, security architects
đ§ Round 3: Behavior & Culture
đ§ą Step 1: As-Is Build
Participant Build:
A classroom with one instructor and distracted students. Explanation:Â Â âSecurity training is one-off and not engaging. People forget or ignore it.â
đŁ Step 2: Share & Reflect
Prompt Response:
âWe rely on people remembering policies instead of building habits.â
đ§ Step 3: Future State Build
Participant Build:
A collaborative space with reward bricks and peer coaching. Explanation:Â Â âWeâve gamified secure behavior and made it part of daily routines.â
đ Step 4: Group Debrief
Flip Chart Insights:
Barriers:Â Low engagement, lack of reinforcement
Enablers:Â Gamification, team champions
Ownership:Â Security awareness team, team leads
đ¨ Round 4: Incident Response
đ§ą Step 1: As-Is Build
Participant Build:
A red alert tower with no clear path to responders. Explanation:Â Â âAlerts go off, but escalation is unclear. People donât know who owns what.â
đŁ Step 2: Share & Reflect
Prompt Response:
âWe rely on tribal knowledge and Slack messages to coordinate response.â
đ§ Step 3: Future State Build
Participant Build:
A structured path from alert to SOC team, with clear roles and response kits. Explanation:Â Â âWeâve mapped out escalation paths and built playbooks. Everyone knows their role.â
đ Step 4: Group Debrief
Flip Chart Insights:
Barriers:Â No playbooks, unclear ownership
Enablers:Â Defined roles, tabletop exercises
Ownership:Â SOC team, incident manager
Follow on LinkedIn:

Comments