Hello @Ethan Smith
Here is our Zero Trust essentials e-book which explains the principals. The reason for moving to zero trust is that data, users and corporate environments don't sit behind a firewall, but have evolved to sit off-premises, in the cloud and across hybrid networks. Enterprises only want trusted, verified users to access their data and systems, so zero trust applies the principals to:
- Verify explicitly: Ensure without doubt that the user is who they say they are.
- Apply least privileged access: If a user becomes compromised or goes rogue, ensure they can do the least amount of damage possible. Do not give them access to systems or data that they do not need to do their job at that point in time.
- Always assume breach: Continually monitor your environment and detect and respond to existing and new threats in real time, to reduce the risk to your data, before bad actors get a foothold and compromise your business.