===== Zero Trust Security Model ===== [[dido:public:ra:xapend:xapend.a_glossary:start| Return to Glossary ]] The **Zero Trust Security Model**, also known as **Zero Trust Architecture(ZTA)**, **Zero Trust Network Architecture(ZTNA)**, sometimes known as perimeterless security, describes an approach to the design and implementation of [[dido:public:ra:xapend:xapend.a_glossary:i:infotech]] systems. The main concept behind [[dido:public:ra:xapend:xapend.a_glossary:z:zero-trust]] is that devices should not be trusted by default, even if they are connected to a managed corporate network such as the corporate [[dido:public:ra:xapend:xapend.a_glossary:l:lan]] and even if they were previously verified. In most modern enterprise environments, corporate networks consist of many interconnected segments, cloud-based services, and infrastructure, connections to remote and mobile environments, and increasingly connections to non-conventional IT, such as [[dido:public:ra:xapend:xapend.a_glossary:i:iot]] devices. The once traditional approach of trusting devices within a notional corporate perimeter, or devices connected to it via a [[dido:public:ra:xapend:xapend.a_glossary:v:vpn]], makes less sense in such highly diverse and distributed environments. Instead, the Zero Trust approach advocates mutual authentication, including checking the identity and integrity of devices without respect to location and providing access to applications and services based on the confidence of device identity and device health in combination with [[dido:public:ra:xapend:xapend.a_glossary:u:user_authentication]]. Source: [[https://en.wikipedia.org/wiki/Zero_trust_security_model ]] /**=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- /* To add a discussion page to this page, comment out the line that says ~~DISCUSSION:off~~ */ ~~DISCUSSION:on|Outstanding Issues~~ ~~DISCUSSION:off~~