12.2 Architecture
12.2.0.1 Perimeter
12.2.0.2 Zero Trust
Although not a new idea Zero Trust [Mar94] has become an increasingly popular concept in computer system security. Whereas, in the past, systems were architect around the idea of perimeter security wherein any user or device inside the perimeter was assumed to be, at least somewhat, trustworthy in zero trust systems all devices and users are untrusted regardless of their relation to other elements of the system. Every attempt to transact with another part of the system requires the user or device to authenticate and authorise.