Zero Trust Architecture
Definition
A cybersecurity framework based on the principle that no user, device, or system should be automatically trusted, whether inside or outside the network perimeter. Zero trust requires continuous verification of identity and access rights for every request, micro-segmentation of network resources, and least-privilege access controls. Adoption is driven by NIST SP 800-207 guidance and the shift to cloud and remote work environments.
Complementary Terms
Concepts that frequently appear alongside Zero Trust Architecture in practice.
A technical architecture that enhances large language model outputs by retrieving relevant information from an external knowledge base before generating a response, grounding the model's output in verified, up-to-date, and domain-specific data. RAG reduces hallucination risk, enables LLMs to access proprietary or recent information not in their training data, and provides citation capabilities.
The principle that data is subject to the laws and governance structures of the country in which it is collected or stored. Data sovereignty requirements affect cloud computing architecture, cross-border data transfers, and vendor selection, particularly in light of GDPR restrictions on transfers to countries without adequate data protection standards.
A decentralised data architecture paradigm that treats data as a product owned by domain-specific teams rather than centralising all data management in a single platform team. Data mesh is built on four principles: domain ownership, data as a product, self-serve data infrastructure, and federated computational governance.
The EU regulatory framework (Regulation 2017/745) governing the design, manufacture, and distribution of medical devices in the European market, which replaced the Medical Devices Directive (93/42/EEC) with significantly stricter requirements. MDR imposes enhanced clinical evidence requirements, more rigorous conformity assessment procedures, a Unique Device Identification system, and comprehensive post-market surveillance obligations.
A business model that creates value by facilitating exchanges between two or more interdependent user groups — typically producers and consumers — through a digital platform. Platform businesses generate powerful network effects and intangible assets including user data, algorithmic matching capabilities, and brand trust.
An economic model built around digital platforms that create value by facilitating exchanges between two or more user groups. Platform businesses derive the majority of their enterprise value from intangible assets including network effects, proprietary algorithms, user data, and brand trust.
A business arrangement in which two or more parties agree to pool resources for a specific project or business activity while maintaining their separate identities. Joint ventures often involve the sharing of intangible assets such as technology, brand rights, and market access, requiring careful valuation and allocation of contributed and created value.
A mandatory conformity marking for products sold within the European Economic Area, indicating that the product meets EU health, safety, and environmental protection requirements. For medical devices, CE marking under the Medical Device Regulation (MDR 2017/745) requires conformity assessment by a Notified Body, clinical evaluation, and ongoing post-market surveillance.
Put this knowledge to work
Use Opagio's free tools to measure and grow the intangible assets that drive your business value.