{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Certified: The CompTIA CloudNetX Audio Course","title":"Episode 112 — Zero Trust Fundamentals: identity as perimeter and continuous verification","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/ee892a7f\"></iframe>","width":"100%","height":180,"duration":1146,"description":"Zero Trust appears in CloudNetX objectives because modern networks cannot rely on location-based trust, and scenario questions often test whether you can design access around identity, context, and verification rather than assumptions. This episode defines Zero Trust as a model that assumes no implicit trust, requiring explicit verification for each access request and enforcing least privilege by default. The first paragraph focuses on identity as the perimeter: users, devices, and workloads are granted access to specific resources only after authentication, authorization, and contextual checks such as device posture and risk signals. It explains that continuous verification is a practical requirement because context changes over time, and a session that was safe at login may become unsafe as conditions shift. The episode frames Zero Trust as a set of principles applied through multiple controls, not as a single product, and it emphasizes that consistent logging and monitoring are part of verification because access decisions must be observable and auditable.","thumbnail_url":"https://img.transistorcdn.com/fCXJrJyctNGR0MxGy1uozF8QSmG4EPc7ZzATlAhBYWo/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYzEx/M2VlMmY1MTE4MGIz/NjU1Y2QwNjY4OTVj/YjdjNi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}