Access is limited to what is required – nothing more.
Multiple layers ensure that a single failure does not lead to compromise.
Trust is evaluated continuously based on identity and context.