When people talk about implementing Zero Trust, often it starts with breaking things down into two main categories, ‘Resources’ and ‘Users.’ Makes sense, since it is the interaction between users and resources that must be secured with Zero Trust controls. Conversations used to start with a pre-determined focus on the internal network. As such, things primarily revolved around implementing network…