Before an enterprise answers “How can we achieve a Zero Trust architecture?” they should be asking “Why are we looking at Zero Trust as an access model? Does it align with our …