Zero trust

Implementing a zero trust policy against cyberattacks