Zero trust has been widely discussed as a means to combat this threat. This approach ensures data access and usage are protected by understanding the flow of data and monitoring all activities around it. As a protective model, zero trust does not put a wall around networks and applications, but around employees and their devices. The move to widespread remote and distributed workforces highlights this challenge. The Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP) and IP Address Management (IPAM), commonly known as DDI, may be a good place to start.
Source: https://www.helpnetsecurity.com/2021/04/26/distributed-zero-trust/