An organization wants to implement a security model that requires all users and devices, whether inside or outside the network, to be authenticated, authorized, and continuously validated before being granted or keeping access to applications and data. Which of the following models best meets this requirement?
Discretionary Access Control
Zero Trust Model
Defense in Depth
Least Privilege Model