A concerted effort must be made to protect critical sensitive data and not just the network. The data is what an adversary is trying to steal and manipulate. A zero trust approach to data security doesn’t rely on a trusted core like traditional approaches. Instead, zero trust strives to improve data security and reduce complexity. This approach can be leveraged by a project or organization of any size and ensures continuous compliance with guidelines such as the JSIG/RMF and CMMC.