Conventional network security has focused on perimeter defenses — once inside the network perimeter, subjects (i.e., end-users, applications, and other non-person entities that request information from resources) are often given broad access to multiple corporate resources. If the subjects are compromised, malicious actors — through impersonation and escalation — can…