In 2003 the challenges of defining the perimeter to an organisation's IT systems was highlighted by the
Jericho Forum, discussing the trend of what was then given the name "
de-perimeterisation". In response to
Operation Aurora, a Chinese APT attack throughout 2009,
Google started to implement a zero-trust architecture referred to as
BeyondCorp an internal initiative to implement a zero trust security model that eliminated the need for a privileged VPN. Throughout the 2010s, zero trust architectures became more prevalent, driven in part by increased adoption of mobile and cloud services. In 2019 the United Kingdom
National Cyber Security Centre (NCSC) recommended that network architects consider a Zero Trust approach for new IT deployments, particularly where significant use of cloud services is planned. An alternative but consistent approach is taken by
NCSC, in identifying the key principles behind zero trust architectures: • Single strong source of user identity • User authentication • Machine authentication • Additional context, such as policy compliance and device health • Authorization policies to access an application • Access control policies within an application In September 2025, the
European Telecommunications Standards Institute (ETSI) Technical Committee CYBER (ETSI TC CYBER) published Technical Specification (TS) 104 102, which details the
ZT-Kipling methodology to be used to achieve Zero Trust security posture. == Sector adoption ==