A company is revising its network security strategy to align with a Zero Trust model. Which of the following principles should be the foundational guideline for the company's revised approach to network security?
Never trust, always verify
Restrict user privileges based on roles
Implement implicit trust zones within the network
Encrypt all data at rest