Develop a zero trust network architecture plan for [organization/sector]. Include: 1) Principles, 2) Technology stack, 3) User/device authentication, 4) Implementation roadmap, 5) Success metrics.
Useful prompt but the real issue is bigger? That usually means the workflow or team mechanism needs attention, not just the wording.
Modernizes security; ensures actionable steps, vendor/tool choices, and metrics for exec buy-in.
Principle: Assume breach. Tech: Okta, Zscaler. Auth: Device posture check. Roadmap: Pilot in finance dept...
Log in to suggest improvements.