- Zero trust Architecture: Every request received is authenticated, authorized and encrypted. In other words, Zero Trust implies that no access will be given to any user, or device from any location before it is verified and tested.
- Principle of Least Privilege (PoLP): Users and systems only have access to information that is important for them to function. The Least Privilege Access is an important part of Zero Trust Architecture and has a robust structure. It not only defines authentication but also strictly ensures authorization.
- Defense in Depth: It is one of the core principles of security where multiple layers of security from infrastructure to application code is applied so that even if one layer is compromised, the other layers remain intact.