Zero Trust operates on the principle of "never trust, always verify." NIST SP 800-207 notes that no implicit trust is granted to assets or user accounts based on their physical or network location; every request must be authenticated and authorized before access is allowed. This contrasts with perimeter-centric models that assume devices inside the LAN are trustworthy. Options that suggest automatic internal trust, perimeter-only protection, or optional identity verification contradict the Zero Trust model.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Zero Trust architecture?
Open an interactive chat with Bash
What is NIST SP 800-207, and why is it significant for Zero Trust?
Open an interactive chat with Bash
How does Zero Trust differ from traditional perimeter-based models?