Process of defining, enforcing, and monitoring permissions to ensure appropriate access to systems, applications, and data in accordance with the principle of least privilege.
Zones are logical groupings used to segment systems, data, or environments based on risk, sensitivity, or function, helping limit the impact of security incidents.