The Zero Trust Model is designed to ensure that trusted identities have access to the software, systems, networks, and data that they need to do their jobs, and that access is checked at every stage to ensure that the employee is who they claim to be.
Another outcome is the avoidance of data breaches. The zero trust model aids in the containment of an incident until it escalates into a compromise. This means that a compromise of one identity form does not always mean that other identities, such as users, computers, network traffic, applications, or data, are also compromised.