We are discussing two sides of the same coin. My point is, PAM is one component that is often utilized in a zero-trust strategy, but it is not required for zero-trust. And just because a company implements a PAM, that does not automatically make them zero-trust.No...I'm not wrong. The matter of privileges is core subject of Zero Trust conception. Here's from Citrix article
![]()
What is Zero Trust Security? - Citrix
Zero trust is a security model that continuously verifies users and devices, rather than trusting by default, to protect against data breaches. Explore the zero trust model and zero trust security.www.citrix.com
Here are other sources of useful info
![]()
What is Zero Trust Security? How Does it Work
Zero Trust Security Model requires strict identity verification for users and devices before access. Learn how to implement Zero Trust effectively.www.fortinet.com
![]()
Never trust, always verify: The Zero Trust security model
What is Zero Trust, and why is it attractive for modern business?www.kaspersky.com
