Zero trust assumes that there is no trust between networks, devices, or users, and therefore necessitates constant, real-time verification of data accessing users. It is a shift from perimeter-based security, in which an intruder can typically travel freely within a network once they've gained access.