An extremely cautious approach to network and datacenter security that enforces authentication of users, machines and applications. There is no single zero trust (ZT) scenario. The term implies ...