A company is revising its network security strategy to align with a Zero Trust model. Which of the following principles should be the foundational guideline for the company's revised approach to network security?
Restrict user privileges based on roles
Never trust, always verify
Implement implicit trust zones within the network
Encrypt all data at rest
|General Security Concepts
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight