Zero Trust Security Process based network controlAllow only specific processes to access network primitives, deny/audit everything else. Process based asset accessAllow only specific processes to access sensitive assets, deny/audit everything else. Process WhitelistingAllow only specific processes to execute, deny/audit everything else. Network SegmentationLimit network access strictly between whitelisted service endpoints, deny everything else. Ensure TLSEnsure that all service endpoints are using the right TLS and certificate configuration. Was this page helpful? Thanks for your feedback! Thanks for your feedback! Help us improve this page by using our feedback form.