Zero Trust Architecture
ZTA
An enterprise cybersecurity architecture that assumes no implicit trust—continuously verifies users, devices, and contexts, and authorizes per‑request access to resources.
#architecture#identity#nist
Last updated: 2025-08-22T00:00:00.000Z
Differences across sources
Evidence
Zero trust assumes that no implicit trust is granted to assets or user accounts based solely on their physical or network location.
Guidance for agencies to progress across identity, devices, networks, applications and workloads, and data pillars in a zero trust journey.
Mappings
Examples
Per‑request authorization
Every API call is authenticated and authorized with strong signals (user, device posture, risk), without relying on a “trusted network” boundary.
More context
Common tenets: explicit verification, least‑privilege access, assume breach, continuous monitoring, and strong identity and device health signals feeding policy decisions.