Zero Trust security throws away the idea that we should have a ‘trusted’ internal network and an ‘untrusted’ external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network.
There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that organisations should start with on their Zero Trust journeys.