Good guys in, bad guys out. This is a principle that has for a long time shaped how companies approach information security. It is anchored on the premise that you can protect your IT environment from malicious actors by simply making the perimeter more resilient, broader, and stronger. However, the underlying notion that you can trust internal traffic is nowadays a fairytale. With more people working from home and practices such as “Bring Your Own Device (BYOD),” it is challenging to establish the perimeter. Hence, perimeter security approaches such as firewalls can no longer be trusted to protect the “perimeter.” This has led to a need for a more robust approach towards securing the network, zero trust architecture.