The core logic of a zero trust security is essentially “never trust, always verify.” In a world of complex cybersecurity threats and
hybrid workforces equipped with numerous applications and devices, zero trust aims to provide comprehensive protection by never assuming an access request comes from a trustworthy source—even if it originates from within the corporate firewall. Everything is treated as if it comes from an unsecured open network and trust itself is viewed as a liability within the zero trust framework.
Zero trust may also be called perimeterless security. This term shows how it is the polar opposite of traditional security models, which follow the principle of “trust, but verify” and regard already-authenticated users and endpoints within the company network perimeter, or those connected via virtual private network (VPN), as safe. But such implicit trust increases the risk of data loss caused by insider threats, since it allows for extensive, unchecked lateral movement across the network.
A zero trust security architecture instead is built upon:
- Explicit verification and continuous validation: Network users must be authenticated, authorized, and validated on an ongoing basis to ensure they always have the proper permissions. Numerous data points such as user identity, geolocation, and device posture may be leveraged for this purpose. One-time validation of a user identity is no longer enough.
- Least-privileged access: Zero trust reduces a company’s attack surface by enforcing the principle of least privilege, so that identities only get the lowest level of access to the network by default. In tandem with other cybersecurity practices such as network microsegmentation and adaptive access, least-privileged access sharply limits lateral movement within a zero trust model.