The graphic is to be used in PowerPoint presentations, on the website and in brochures. The background to this graphic is as follows: The strategy in IT security today works according to the so-called "zero trust model".