Organisations implementing Zero Trust build policies that define how access is granted, based on identity and business context. That is not the absence of trust
Zero Trust wasn’t designed to operate across environments with differing levels of classification and cannot manage the risk of sharing data across different networks