Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Glossary > Zero Trust

What is Zero Trust?

Understanding Zero Trust

A security model that assumes no user device network or system component is inherently trusted whether inside or outside the network perimeter. Zero Trust is a security concept centered on the principle never trust always verify requiring strict identity verification authentication and authorization for every person and device attempting to access resources regardless of location. This model eliminates the concept of a trusted network perimeter replacing it with microsegmentation strong authentication and continuous validation. Zero Trust frameworks include NIST SP 800-207 and various industry models. Organizations implement Zero Trust through identity-centric security microsegmentation least privilege access continuous monitoring and adaptive policies. For example a financial services organization might implement a comprehensive Zero Trust architecture including multifactor authentication for all access continuous device security verification microsegmentation that restricts lateral movement between application components just-in-time and just-enough access privileges continuous monitoring and behavioral analytics that detect unusual activities and policy enforcement points that verify every access request regardless of source or location. Related terms Zero Trust Architecture ZTA Never trust always verify Identity-based security Microsegmentation Least privilege Continuous verification Adaptive authentication Just-in-time access Conditional access Network segmentation.

Learn More About Zero Trust: