Looking at zero trust from an attacker’s perspective