Zero Trust security is an IT security model that relies on strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are inside or outside the network perimeter. ZTNA is the primary technology linked with Zero Trust architecture; however Zero Trust is a comprehensive network security approach that integrates various principles and technologies.A zero trust architecture is based on the principle “never trust, always verify.” It enforces access policies based on context, such as the user’s role and location, their device, and the data they are requesting, in order to block inappropriate access and lateral movement throughout an environment.