Glossary term
Zero Trust
Also: Zero-Trust Architecture, ZTA
A security model built on the principle that no user, device or network location is trusted by default. Access is continuously verified against identity, device posture, context and policy, regardless of whether the request comes from inside or outside the corporate network.
Zero Trust is a model, not a product. It is composed of capabilities across IAM, device management, network segmentation, data protection and continuous monitoring. Vendors selling Zero Trust typically cover one or two layers; no single product delivers it end to end.
The practical question in a Zero Trust decision is sequencing. Most programmes start with identity and device, move to network (ZTNA replacing VPN) and finish with data and workload controls. The memo should name the stage, the target state and the criteria for moving on, not treat Zero Trust as a single binary.
Regulatory context: NIS2 Art. 21 and DORA Art. 9 do not name Zero Trust, but their access-control and least-privilege expectations align closely. A Zero Trust programme maps directly to these articles as the operating model.
Related terms
IAM (Identity and Access Management)
The stack of systems that governs who has access to which systems under which conditions. IAM covers…
Sovereign cloud
A cloud deployment model that guarantees operational, legal and technical control of data and worklo…
Compliance mapping
The explicit link between a decision (vendor, architecture, control) and the specific regulatory art…
AI Act Conformity Assessment
Procedure to demonstrate that a high-risk AI system complies with the EU AI Act before being placed …
AI Act Risk Categories
Four-tier classification under the EU AI Act: prohibited (Art. 5), high-risk (Annex I/III), limited …
Audit-ready decision
A decision whose record is structured, evidence-backed and stakeholder-signed to a level that a thir…
BAIT
BaFin circular that concretises IT requirements for credit institutions. Specifies MaRisk AT 7.2 for…
BCM
Discipline for maintaining critical business processes during disruptions. Standards: ISO 22301, BSI…
