This document is subject of change.
If you using Azure AD for authentication, I disabled Email authentication so you will need either tenant Account or Microsoft Accout to login.

Zero Trust is a cybersecurity framework based on the principle โNever trust, always verify.โ It assumes that threats can exist both inside and outside an organization's network, so access should not be automatically granted based on location or credentials alone. Instead, every request must be continuously authenticated, authorized, and monitored.
Verify Explicitly โ Always authenticate and authorize users, devices, and applications based on multiple factors (e.g., MFA, device compliance, geolocation).
Least Privilege Access โ Users and devices should have only the minimum permissions required to perform their tasks, reducing potential attack surfaces.
Micro-Segmentation โ Networks are divided into smaller, isolated zones to limit lateral movement in case of a breach.
Assume Breach โ Always operate under the assumption that a breach has already happened and design security measures accordingly.
Continuous Monitoring and Analytics โ All access requests and behaviors are logged and analyzed for anomalies or potential threats.
Device and Endpoint Security โ Every device accessing the network is verified and checked for compliance with security policies.
Traditional security models assume trust within a network perimeter (e.g., firewalls and VPNs). However, with remote work, cloud adoption, and sophisticated cyber threats, attackers can easily bypass perimeter defenses. Zero Trust mitigates this by enforcing strict access controls at every level.