CISA (2021)
The Seven Tenets of Zero Trust
All data sources and computing services are considered resources.
All communication is secured regardless of network location.
Access to individual enterprise resources is granted on a per-session basis.
Access to resources is determined by dynamic policy-including the observable state of client identity, application/service, and the requesting asset-and may include other behavioral and environmental attributes.
The enterprise monitors and measures the integrity and security posture of all owned and associated assets.
All resource authentication and authorization are dynamic and strictly enforced before access is allowed.
The enterprise collects as much information as possible about the current state of assets, network infrastructure and communications and uses it to improve its security posture.
The links below are a great start to exploring zero trust on your own:
Garner predicts that about 60% of corporations will phase out VPNs in favor of Zero Trust Architectures by 2023. Zero Trust Architectures (ZTA), Zero Trust Network Architectures (ZTNA), Software Defined Networks (SDN), Secure Access Service Edge (SASE), and Software Defined Wide Area Network (SD-WAN) are all acronyms you are going to continue to hear in the industry. Implicit vs explicit trust in any given network is a core concept of security. Implicit trust means that, once authenticated, users are able to move freely around a network laterally. The ability to copy, download, or even delete data does not require the ability to re-authenticate. This assumption that everything within a network is safe, is outdated. Explicit trust allows users to access explicitly defined data. Explicit trust should be grated/revoked at every stage, therefore eliminating implicit trust. A good way to think of zero trust concepts is: 'eliminating implicit trust'. Here's a great example of implicit vs explicit trust from Forcepoint:
Microsoft Zero Trust Corner
Two of the coolest concepts in Zero Trust today are the Cloud Access Security Broker and the Secure Access Service Edge.