This concept forms the basis for Zero Trust Security, which states that no one should ever be trusted by default but must always have it earned at every instance by a user or device, internally or externally, to the corporate network. This immediately upsets the assumption that once one is inside the network, they can be trusted. On the contrary, Zero Trust assumes that threats may appear threats may appear outside and inside the organization. Hence, every request made, whether through a user, device,e or an application, must be authenticated continuously.