What it is
Zero Trust is a security approach where access is never granted based on network location alone. Every request is evaluated using identity, device posture, and context, and then continuously re evaluated as conditions change.
Key points
- Segment apps and data; minimize implicit trust.
- Verify explicitly: user, device, context.
- Enforce least privilege and monitor continuously.
Concrete example
A developer accesses a code repository. The request is allowed only if the user is strongly authenticated, the device meets patch and encryption requirements, and the request comes from an approved context. If the device posture changes or the session risk increases, access is stepped down or revoked.