Zero Trust Architecture
1. Identy Management and authentication
2. Access Polcies
3 Policy Management security functions, Policy Decisions, authorization based on policies and triggered by monitoring events.
4. Policy Enforcement
5 Continuous Monitoring and reporing