Zero-trust architecture: A security model that assumes no user or device can be trusted by default, regardless of its location (inside or outside the network) or whether it has previously been verified. Instead, every request for access to resources must be authenticated and authorized. This approach minimizes the potential for unauthorized access and reduces the attack surface by limiting access to only what is needed for a specific task, even if a user’s credentials or device has been compromised.
Categories: CC D4: Network Security | CCSP D1: Cloud Concepts - Architecture and Design | CISM D3: Information Security Program | CISSP D1: Security and Risk Management | Security+ D1: General Security Concepts | SSCP D2: Access Controls
« Back to Glossary Index