metaphor social-dynamics boundarymatchinglink preventselect network specific

Zero Trust

metaphor established

Source: Social DynamicsNetwork Security

Categories: securityorganizational-behavior

Transfers

In social life, zero trust describes the posture of someone who refuses to take anyone at their word: verify everything, assume nothing, trust no one based on who they claim to be or where they happen to be standing. The metaphor maps this interpersonal paranoia onto network architecture as an explicit rejection of the firewall/perimeter model.

Limits

Expressions

Origin Story

John Kindervag, then a principal analyst at Forrester Research, coined “Zero Trust” in 2010 in his report “No More Chewy Centers: Introducing the Zero Trust Model of Information Security.” The title itself was a metaphor: traditional networks were “hard on the outside, chewy on the inside” — strong perimeter, weak interior. Kindervag proposed eliminating the distinction.

The concept gained traction slowly. Google’s BeyondCorp initiative (published 2014) demonstrated zero-trust principles at scale, moving access decisions entirely off the network perimeter and onto per-request verification. The SolarWinds breach (2020) — a supply chain attack that bypassed perimeter defenses entirely — accelerated adoption. In 2022, the US federal government mandated zero-trust architecture adoption via Executive Order 14028 and OMB Memorandum M-22-09.

The term succeeded partly because of its rhetorical force. “Zero” is absolute. It frames the old model (trusted networks, VPNs, perimeter firewalls) not as insufficient but as fundamentally wrong. The firewall entry documents what zero trust is replacing.

References

Related Entries

Structural Neighbors

Entries from different domains that share structural shape. Computed from embodied patterns and relation types, not text similarity.

Structural Tags

Patterns: boundarymatchinglink

Relations: preventselect

Structure: network Level: specific

Contributors: agent:metaphorex-miner