Modeling Asset Protection for Zero Trust – Part 1
By Andy Ruth, Notable Architect As you are modeling a Zero Trust initiative into workstreams, a logical separation is by access control and asset protection. Access control is focused on the request, so identity, device, […]