A security framework that eliminates implicit trust and requires continuous verification of all users, devices, and applications attempting to access resources, regardless of their location inside or outside the network perimeter. It is widely adopted across industries to safeguard digital assets and reduce security risks.