Zero-trust systems require verification from a highly-verified source before any given change be made to a system or network.

Read more here.