Zero Trust Security

A security model where no one is trusted by default, requiring strict verification for every access.

The Zero Trust model operates on the principle of 'never trust, always verify'. Unlike traditional security models that rely on a perimeter defense (trusting everything inside), Zero Trust assumes threats can come from anywhere. It enforces strict identity verification, least privilege access, and micro-segmentation to minimize the blast radius of a potential breach. Every access request is fully authenticated, authorized, and encrypted before granting access.

        graph LR
  Center["Zero Trust Security"]:::main
  Pre_identity_and_access_management_iam["identity-and-access-management-iam"]:::pre --> Center
  click Pre_identity_and_access_management_iam "/terms/identity-and-access-management-iam"
  Rel_access_control_bypass["access-control-bypass"]:::related -.-> Center
  click Rel_access_control_bypass "/terms/access-control-bypass"
  Rel_zero_trust_network_access["zero-trust-network-access"]:::related -.-> Center
  click Rel_zero_trust_network_access "/terms/zero-trust-network-access"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explain Like I'm 5

It's like a building where every single door, even the ones inside, requires a key and a background check every time you walk through them.

🔗 Related Terms

📚 Sources