By definition, Zero Trust connections are:
The correct answer is A. By definition, Zero Trust connections are independent of the network for control or trust. This is one of the most important distinctions between Zero Trust and legacy security models. In traditional architectures, trust is often inherited from network location. If a user is on the corporate network, or connected into it by VPN, that user may gain broad access based on network reachability. Zero Trust rejects that model. Instead, trust is established through identity, posture, context, and policy for each access request.
Because of this, the underlying transport network becomes less important from a trust perspective. Whether the user is on Wi-Fi, broadband, mobile internet, IPv4, or IPv6 is not the defining factor in the access decision. The connection can operate over many types of networks, but the network itself is not what grants trust. Options B, C, and D all describe legacy or infrastructure-specific dependencies that Zero Trust is designed to avoid. A Zero Trust connection is therefore defined by policy-controlled, context-aware access, not by dependence on a particular network type or appliance path.
Currently there are no comments in this discussion, be the first to comment!