Much is being written lately about so-called "Zero Trust Model" security, which prompts me to ask, "Since when did we security folk trust anyone?" On the NIST site, you'll find a thorough report NIS...
Nice paper! I have to trust the BIGIP admins as they're root on the CLI and no way to change that (tmsh access only or appliance mode? no way). How does that fit in the zero trust model? Or is it only applying to the data path? ;-)