Which of the following best describes the core principle of the Zero Trust Model?
Enforcing multi-factor authentication for all access requests
Assuming no user, device, or network traffic should be trusted by default
Granting least privilege access to all users
Trusting all users and devices within the network perimeter