This document describes what a Zero Trust
strategy is and how to implement it in your network using a five-step
methodology that guides you through best practices for identifying
your critical protect surfaces, mapping your critical transaction
flows, architecting your Zero Trust network, creating Zero Trust
policy, and maintaining the deployment. Sections include links to
detailed information from Palo Alto Networks, including how to configure
next-generation firewalls (physical and virtual) and security capabilities
from Palo Alto Networks to prevent data breaches.