A. Companies should focus on protecting their resources rather than on protecting the boundaries of their internal network.
B. Companies must apply the same access controls to all users, regardless of identity.
C. Companies that support remote workers cannot achieve zero trust security and must determine if the benefits outweigh the cost.
D. Companies can achieve zero trust security by strengthening their perimeter security to detect a wider range of threats.
Explanation:
Zero Trust Security is a security model that operates on the principle that no entity, whether inside or outside the network, should be trusted by default. Instead, every access request is thoroughly verified before granting access to resources. This model emphasizes protecting resources rather than merely securing the network perimeter, acknowledging that threats can originate both inside and outside the network.