By observing how users and applications regularly consume data and limiting or stopping any abnormal consumption of data in real time, we get very close to a true Zero Trust posture. Going further and creating a governance model so that data requests must flow through it ensures an even tighter mechanism of control.