Understanding Zero Trust Network
According to the IT security concept known as "zero trust security," all devices and users attempting to access resources on a private network must undergo stringent identity verification, regardless of whether they are located inside or outside the network perimeter. Although ZTNA is the primary technology linked to Zero Trust architecture, Zero Trust is a comprehensive strategy for network security that integrates a number of distinct technologies and concepts.
In other words, typical IT network security assumes that everything and everyone within the network is trustworthy. Nothing and no one are trusted in a zero trust architecture.
Traditional IT network security is based on the castle-and-moat concept. In castle-and-moat security, it is hard to obtain access from outside the network, but everyone inside the network is trusted by default. The problem with this approach is that once an attacker gains access to the network, they have free rein over everything?inside.