A SOC analyst is investigating an alert from Cortex XDR that suggests a fileless malware attack on a critical server. The initial investigation reveals a suspicious PowerShell process that was spawned by a legitimate application. Which Zero Trust principle is most directly challenged by this type of attack?