A security concept that assumes that threats can come from within or outside the network, requiring strict identity verification for every person and device trying to access resources on the network.