Best practices now stipulate a “trust no one, trust nothing” attitude toward network access. CISOs need to manage the explosion of devices resulting from the Internet-of-Things (IoT) and bring-your-own-devices (BYOD) strategies. The most secure network is one that has no connections. The most effective strategy is a holistic approach that delivers visibility and control by focusing on three key areas: who is on the network, what happens to managed devices when they leave the network.”]
Source: https://www.csoonline.com/article/3607448/3-keys-to-an-effective-zero-trust-access-strategy.html