Security FoundationsAlso called: "zero trust", "zero trust security"
Zero Trust replaces the idea of a trusted internal network with explicit, continuous verification.
Core principles
- Never trust, always verify: authenticate and authorize every request.
- Least privilege: grant only the permissions a user or service needs for a task.
- Assume breach: design controls so an attacker cannot move laterally.
Implementation checkpoints
- Strong identity controls with MFA and device trust.
- Microsegmentation around critical applications and data.
- Continuous monitoring of behavior and context.