A cybersecurity architecture based on Zero Trust principles moves away from implied trust based
on network location and perimeter-based security alone and instead continuously evaluates trust on a per-transaction basis to ensure data is protected. This makes Zero Trust particularly well-suited for defense and intelligence applications as users become more geographically distributed and as public cloud usage grows.