-Research the zero trust model.
Write a report that describes the following:
-The purpose of zero trust and what differentiates it from other security models
-An overview of how zero trust works in a network environment
-How zero trust incorporates least privilege access through role-based access control (RBAC) and/or attribute-based access control (ABAC)