In the scenario of deploying Zero Trust Architecture, which of the following practices BEST aligns with ensuring the principle of least privilege?
Implement regular scheduled vulnerability scans of the network infrastructure.
Enable multifactor authentication for all users and devices.
Encrypt sensitive data in transit and at rest across the network.
Grant users and devices access only to the data and resources essential for their roles.