An IT administrator is tasked with improving the organization's security posture by ensuring that all access to corporate resources is authenticated, authorized, and encrypted, regardless of where the request originates or what resource is accessed. Which security approach best aligns with this strategy?
Defense-in-Depth Strategy
Role-Based Access Control (RBAC)
Zero Trust Model
Perimeter Security Model