
That's That's the overall view of how you attack zero trust. Going through this through the different phases of the kill chain, how do you attack initial access? Stealing cookies, number one. If you're not using FIDO2 mandatory everywhere for your MFA, you're vulnerable. Uh trust me, we just migrated about a year ago because we had a very exposing red team event where they showed us how push notifications with the numbers and all this other cool stuff wasn't enough.