Which of the following is a KEY principle of a Zero Trust architecture?
Only allowing access to systems and data from trusted locations
Mandating the use of complex passwords for access to data systems
Requiring periodic reauthentication of access to systems
Assuming that all systems are malicious
Submit