Return to Article Details Implementation of zero trust architecture based on the proposed model to ensure enterprise cyber-security Download Download PDF