: A more advanced blueprint that enables IT to evolve into an Intelligent Information Network (IIN) .

: Building security into the initial architecture—using Zero Trust Access and micro-segmentation—rather than adding it as a secondary layer.

: Contains business and collaborative applications that leverage the services below. 2. Key Design Principles