12.2 Architecture

12.2.0.1 Perimeter

12.2.0.2 Zero Trust

Although not a new idea Zero Trust [Mar94] has become an increasingly popular concept in computer system security. Whereas, in the past, systems were architect around the idea of perimeter security wherein any user or device inside the perimeter was assumed to be, at least somewhat, trustworthy in zero trust systems all devices and users are untrusted regardless of their relation to other elements of the system. Every attempt to transact with another part of the system requires the user or device to authenticate and authorise.