The idea of not having a traditional castle-and-moat security architecture and replacing it with a Zero-Trust method to defend the crown jewels sounds a little absurb? Not really. In a Zero Trust Architecture, it eliminates the inherent trust bestowed on internal networks. Instead all access to resources are inspected and granted on a least-privileged strategy regardless of location. Sounds cool? Read on.
The following contents are based on my interpretation and understanding of Zero-Trust security model or Zero-Trust Architecture. I am not an expert in this area and I am just a random guy on the streets trying out Zero-Trust.