The Zero Trust approach means nothing inside or outside the company perimeter should be trusted. As a result, every user has to authenticate themselves and their identity with every login every time before they are granted access to company resources, applications and data. Components are: Multifactor authentication,
IAM (identity and access management), Orchestration, Analytics
Encryption, Scoring, File system permissions and Governance policies (give users least amount of access they need to complete their tasks).