This statement is false. In a Zero Trust architecture, connections are highly contextual and are not treated the same. The security policies applied to a connection are granular and depend on multiple factors, including the identity of the user, the posture of the device, the user's location, and the sensitivity of the destination application. For example, a user on a managed corporate device accessing a low-risk application will have a different policy enforced than the same user on an unmanaged personal device trying to access sensitive financial data. This principle of least-privileged, context-aware access is central to Zero Trust.