Zero Trust Requirements
Figure 3: Zero Trust Key Requirements
The drivers above help define the requirements to determine the capabilities that a Zero Trust must support.
As Figure 3 shows, these requirements tend to disrupt existing processes and models, defining capabilities that must be supported by a modern information security architecture for the Digital Age.