Everyone talks about zero trust but actual implementations vary wildly. We're implementing BeyondCorp-style access at our org. What does your zero trust architecture actually look like in practice?
Sign in to answer this question.