The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve Zero Trust: securing your users. Today, most security teams fail to appreciate how much power and trust they grant users. This report will help you enhance your security posture and move your team closer to a complete Zero Trust architecture by guiding you through critical decisions and breaking down the essential strategies and technologies.