The zero-trust strategy dispenses with the conventional notion that businesses should trust everyone or everything that is connected to a network or protected by a firewall
System and network administrators should regulate access to business networks or systems based on individual users’ roles, which are defined by their job title, level of authority, and responsibility within the businessHuman and device identification – digital identities both for humans and devices (aplications)