{"id":15544,"date":"2021-08-16T17:17:58","date_gmt":"2021-08-16T17:17:58","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/zero-trust\/"},"modified":"2023-10-16T13:06:39","modified_gmt":"2023-10-16T13:06:39","slug":"zero-trust","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/34572\/zero-trust-zt","title":{"rendered":"Zero Trust"},"content":{"rendered":"

What Does Zero Trust Mean?<\/span><\/h2>\n

Zero Trust (ZT) is a data-centric cybersecurity strategy for enterprise computing that assumes no end-user, computing device, web service, or network connection can be trusted — even when an access request originates from within the organization\u2019s own network perimeter<\/a>.<\/p>\n

The Zero Trust model has evolved to take into account distributed computing and an ever-expanding attack surface. Unlike a single sign-on (SSO<\/a>) strategy that allows users to log in once and access multiple network services without re-entering authentication factors, Zero Trust requires authentication factors to be verified — and re-verified — each time a network resource is requested.<\/p>\n

Because untrusted threat actors exist both internally and external to a network, Zero Trust supports the following principles:<\/p>\n