In today’s digital age, organizations are constantly under threat from cyber attacks. One way to combat these threats is through the implementation of a zero trust architecture. This approach assumes that all network traffic, both internal and external, is malicious and must be verified before access is granted. …