Core principles of Zero Trust
Zero Trust starts from the assumption that the network is already compromised. An attacker could be inside the firewall, an employee's laptop could be infected, a legitimate account could be stolen. Given that assumption, the right response is to verify every access request as if it comes from an untrusted source, every time.
The three foundational tenets are: verify explicitly (always authenticate and authorize based on all available data points, including identity, location, device health, and behavior), use least privilege (give access only to exactly what is needed for the task at hand, nothing more), and assume breach (design systems so that when a breach occurs, the attacker's movement is limited and the damage is contained).
Micro-segmentation is a key technical implementation. Instead of one large trusted zone, networks are divided into many small segments. Each workload, application, or service communicates only with the specific other resources it legitimately needs. If an attacker compromises one segment, they cannot move laterally to others without triggering authentication and authorization checks at every boundary.
Identity as the new perimeter
In Zero Trust, identity becomes the primary access control mechanism. The network location of a request matters far less than the verified identity of the user, the health of the device they are using, and whether that combination makes sense given context. A request from a verified identity on a compliant device in a normal location carries more trust than a request from the same identity on an unknown device from an unusual country at 3 AM.
Continuous verification is the mechanism that enforces this. Rather than authenticating once at login and trusting the session indefinitely, Zero Trust systems continuously evaluate risk signals throughout a session. Anomalous behavior, like suddenly downloading large volumes of data, can trigger step-up authentication or session termination without waiting for the session to expire naturally.
Strong authentication, particularly phishing-resistant MFA using hardware tokens or passkeys, is a prerequisite for Zero Trust. If identity is the new perimeter, that perimeter is only as strong as the authentication protecting it.
How to choose the correct answer
Zero Trust vs perimeter security: perimeter = trusted inside, untrusted outside. Zero Trust = no implicit trust regardless of location, continuous verification for every access request.
Key Zero Trust controls: identity-based access, device health checks, least privilege, micro-segmentation, continuous monitoring.
Scenario: employee connects from home and accesses internal resources through a VPN, no additional checks. This is perimeter-based, not Zero Trust. Zero Trust would verify identity, device health, and behavioral context for every resource request, regardless of VPN status.
Software Defined Perimeter (SDP) and Identity-Aware Proxy are Zero Trust implementations that replace traditional VPN: only authenticated, authorized users can see and access specific resources. Resources are invisible to everyone else.