Disable threats and attack methods before the attack occurs
Verify trust in each workload using an identity credential whose chain of trust is with the workload itself rather than implied trust from a certificate authority or assertion entity.
End-to-end encrypted communication channels between workloads, built on-demand, achieve complete confidentiality and integrity of data in transit in all clouds.
Rotate credentials at a high frequency to create a moving target defense that prevents threat actors from gaining the information they need for an attack.