A company's security policy requires verification of identity and context at each step of network access to ensure only authorized and authenticated users and devices have access to its network resources. Which security concept best adheres to this policy?
Least privilege
Zero Trust
Honeypot
Role-based access