Q. Consider the following statements regarding Zero-Trust Architecture (ZTA):
  1. It assumes no inherent trust, verifying every access request continuously.
  2. It is primarily designed for perimeter-based security with implicit trust inside the network.
  3. ZTA principles are increasingly applied in cloud-native and hybrid environments.
Which of the above statements is/are correct?

Answer: 1 and 3 only
Notes: Zero-Trust Architecture is based on the principle of "never trust, always verify," enforcing continuous access validation regardless of network location. It is not perimeter-based, making Statement 2 incorrect. ZTA's use is expanding in cloud-native and hybrid setups, supporting Statement 3. Hence, only Statements 1 and 3 are correct.
Question Source: 📚This question has been sourced from GKToday's Target UPSC Prelims for 2026, 2027 & 2028 App Exclusive Course in GKToday Android Application which provides more than 12K Topicwise UPSC Prelims General Studies questions with explanations framed on UPSC pattern. Download the app here.
📌 Question Number: 100 in 118: Basic Computers, IT and AI Awareness in the above course in App.