Zero Trust operates on the principle of "never trust, always verify." NIST SP 800-207 notes that no implicit trust is granted to assets or user accounts based on their physical or network location; every request must be authenticated and authorized before access is allowed. This contrasts with perimeter-centric models that assume devices inside the LAN are trustworthy. Options that suggest automatic internal trust, perimeter-only protection, or optional identity verification contradict the Zero Trust model.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles of Zero Trust architecture?
Open an interactive chat with Bash
How does Zero Trust protect against insider threats?
Open an interactive chat with Bash
What are the challenges of implementing a Zero Trust architecture?