Your organization is moving away from a traditional security model and wants to ensure that every access request to its resources is authenticated, authorized, and encrypted.
Which principle of the Zero Trust Model addresses this requirement?
Assume breach
Use least privilege access
Verify explicitly
Encrypt data in transit and at rest