The mantra of cybersecurity now is to trust nobody and touch nothing to guard against increasingly subliminal and invasive threats. This also conforms with demands for automated onboarding of devices at scale, especially for the IoT with increasing incorporation of embedded SIMs (eSIMs). Cybersecurity comes with its own lexicon of jargon and acronyms, like defense in depth, secure by design, zero trust, and blockchain immutability, all of which we have covered in various contexts. We now have a new security neologism in zero touch, which combines with zero trust to determine the underlying cybersecurity architecture for enterprise networks, especially in the IoT domain. The concept of zero touch has really emerged in the last six months, and we define it…