Perimeter defenses guarding your network aren't as secure as you might think.
Hosts behind the firewall have no defenses of their own, so when a host in the 'trusted' zone is breached, access to your.
Esteto
Cartepedia
Zero trust networks: building trusted systems in untrusted networks