正解:D
The Zero Trust security model operates on the principle that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. It emphasizes continuous monitoring, validation, and least-privilege access to minimize exposure to sensitive parts of the network.
References: Zero Trust security | What is a Zero Trust network? | Cloudflare, Zero Trust Model: Unveiling 3 Core Principles for Enhanced Security, The Evolution of Zero Trust and the Frameworks that Guide It