Q. Consider the following statements regarding Zero-Trust Architecture (ZTA): - It assumes no inherent trust, verifying every access request continuously.
- It is primarily designed for perimeter-based security with implicit trust inside the network.
- ZTA principles are increasingly applied in cloud-native and hybrid environments.
Which of the above statements is/are correct?
Answer:
1 and 3 only
Notes: Zero-Trust Architecture is based on the principle of "never trust, always verify," enforcing continuous access validation regardless of network location. It is not perimeter-based, making Statement 2 incorrect. ZTA's use is expanding in cloud-native and hybrid setups, supporting Statement 3. Hence, only Statements 1 and 3 are correct.