Traditional or perimeter network security models are designed to focus on keeping attackers out of the network but is vulnerable to users and devices inside the network. Zero Trust security models assume the network has been compromised and challenges the user or device to prove that they are not attackers.
In this age and time of near boundary-less network systems can we rely on Zero trust models for securing our networks against information systems attacks?