The mass transition to remote work and the development of public cloud services force us to look for new approaches to ensuring IT security. Every day, a huge number of unknown devices and applications access the network. This leads to the realization that no one inside or outside the network can be trusted. Under these conditions, the concept of zero trust (Zero Trust Access) is the most effective model of network security.