- Research the zero trust model.
- Write a report that describes the following:
- The purpose of zero trust and what differentiates it from other security models
- An overview of how zero trust works in a network environment
- How zero trust incorporates least privilege access through role-based access control (RBAC) and/or attribute-based access control (ABAC)
APA format and 350 words