A company is evaluating Zero Trust security principles for Microsoft 365. You need to identify a Zero Trust security principle used in Microsoft 365. Select the answer that correctly completes the sentence. A Zero Trust security principle that uses segmented access for networks, users, devices, and applications is ___?