The Zero Trust model acknowledges that Trust is a dangerous vulnerability that only benefits malicious actors who exploit the antiquated trust model. Therefore, Zero Trust eliminates the idea of a trusted internal network and an untrusted external network. Instead, all traffic and users are treated as untrusted. All resources are accessed in a secure manner, and all traffic is logged and inspected. Security becomes ubiquitous throughout the infrastructure, designed from the inside-out, based upon the elements that need to be protected, and designed with compliance in mind. By embracing the Zero Trust model, organizations can position themselves for a future in which they are not in constant reactive mode to threats, but have cybersecurity built into their technologies, cultures, and operations.