AZ-900 Question 333

Which security approach assumes that no user or device should be trusted by default, regardless of their location?