aliases:
- ZTA
- ZTNA
tags:
- Type/Tech/Architecture/Networking
- area/tech/networking
publish: true
version: 1
dateCreated: 2022-06-02, 15:52
dateModified: 2024-03-17, 18:42
from:
- "[[Tech]]"
related:
contra:
- "[[Perimeter-based Security]]"
to:
The Zero Trust Security Model, also known as zero trust architecture (ZTA), and sometimes known as perimeterless security, describes an approach to the strategy, design and implementation of IT systems. The main concept behind the zero trust security model is "never trust, always verify", which means that users and devices should not be trusted by default, even if they are connected to a permissioned network such as a corporate LAN and even if they were previously verified. | |
---|---|
wikipedia:: Zero trust security model |
aka:: ZTA, ZTNA
contra Perimeter-based Security, e.g. contra VPN giving access to a large section of a private network assumed to be secure.