Anywhere that packets pass is a place that can offer cybercriminals command and control of critical network assets. Defenders can use these avenues to enable better security and ultimately build a robust Zero Trust architecture. Segmenting networks and building microperimeters to isolate your organization’s assets is critical to defending against today’s threats. This report breaks down the specific network tools, packet-level controls, and security technologies that defenders should consider as their organizations adopt Zero Trust.