We implemented a Zero Trust architecture, making password theft useless for attackers, and a corporate VPN that completely hid the infrastructure (databases, code, admin panels) from external attacks. Using Access Control Lists (ACLs), non-target traffic was cut off, while priority routing ensured the uninterrupted operation of essential services, bypassing provider restrictions.