GK Question

technology medium fill_blank

The security approach of validating every request as if it originates from an untrusted network is called ________ Security.

Answer: Zero Trust

Zero Trust Security assumes breach and verifies every request regardless of source. Implements: identity verification, least privilege, micro-segmentation, and continuous monitoring. Contrasts with perimeter-based 'castle-and-moat' model. Critical for modern enterprise security architecture.

Topic Advanced Cybersecurity
Exam Relevance Banking, UPSC, SSC