
Modeling Asset Protection for Zero Trust – Part 2
By Andy Ruth, Notable Architect (Part 1 appeared Tuesday here.) As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the […]