Back to Glossary

Cybersecurity & Risk

Zero Trust Architecture

Zero Trust Architecture (ZTA) is a strategic cybersecurity model that mandates strict identity verification for every user, device, and application attempting to access resources, regardless of their location.

Context for Technology Leaders

For CIOs and Enterprise Architects, ZTA is crucial for modernizing security postures against evolving threats, aligning with frameworks like NIST SP 800-207. It shifts from perimeter-based defenses to a granular, identity-centric approach, essential for securing hybrid environments and remote workforces.

Key Principles

  • 1Verify Explicitly: Authenticate and authorize all access requests based on all available data points, including user identity, device health, and service context.
  • 2Use Least Privilege Access: Grant users and devices only the minimum access necessary to perform their tasks, minimizing the potential impact of a breach.
  • 3Assume Breach: Design security with the assumption that breaches will occur, focusing on containment and rapid response rather than solely on prevention.
  • 4Microsegmentation: Divide networks into small, isolated segments to limit lateral movement of threats and reduce the attack surface.
  • 5Continuous Monitoring: Continuously monitor and analyze all network traffic, user behavior, and system activity for anomalies and potential threats.

Related Terms

Least Privilege AccessMicrosegmentationIdentity and Access ManagementMulti-Factor AuthenticationContinuous MonitoringAdaptive Access Control