These models assume the bad guys already lurk in networks, perhaps by stealing someone’s security credentials. They aim to stop the intruders from running amok by confining them to limited access to areas inside those networks.
As a cybersecurity professional, I could not agree more with this statement. On many networks today it’s simply impossible to even define what the “perimeter” is. Zero trust is the only model that makes any sense. Anyone who is willing to guarantee you than an intruder is not already inside the Enterprise is either lying or ignorant.
-Rob