Paper

  1. Research the zero trust model.
  2. Write a report that describes the following: 
    • The purpose of zero trust and what differentiates it from other security models
    • An overview of how zero trust works in a network environment
    • How zero trust incorporates least privilege access through role-based access control (RBAC) and/or attribute-based access control (ABAC)

      APA format and 350 words