I'm leaning towards Step 4 as well. That's where we translate the protect surface and transaction flows into the actual policy that governs access. Defining those user and app permissions is a key part of that step.
Step 4 is the one that deals with policy creation, so that's where I'd expect to see user and application access defined. Gotta make sure those access controls are locked down tight in the Zero Trust model.
Okay, I think I've got this. Application and user access would be defined in Step 4, when we create the actual Zero Trust policy. That's where we lay out the specific access rules and controls.
Hmm, I'm a bit confused on this one. I thought user and application access was part of the Architect step, but now I'm second-guessing myself. I'll have to review my notes to be sure.
I'm pretty sure this is covered in Step 4, where we create the Zero Trust policy. That's where we define the access controls for users and applications.
I'm going with C. It just makes the most sense to me. Step 4 is all about establishing the policies that enforce Zero Trust, including user and application access controls.
I was leaning towards D. Step 1: Define the Protect Surface, but now I'm not so sure. Doesn't that step focus more on identifying the critical assets to protect?
Hmm, I think the correct answer is C. Step 4: Create the Zero Trust Policy. That's where you define the access controls and policies for users and applications, right?
Earlean
3 months agoBev
3 months agoMauricio
3 months agoVanesa
4 months agoSalley
4 months agoAnjelica
4 months agoWillis
4 months agoDevorah
4 months agoCatalina
5 months agoJules
5 months agoLera
5 months agoThaddeus
5 months agoStefania
5 months agoTwana
5 months agoSolange
10 months agoEmily
9 months agoKathrine
9 months agoJustine
9 months agoOren
10 months agoMelda
11 months agoJulio
10 months agoCarey
10 months agoJerilyn
11 months agoAbel
11 months agoPortia
10 months agoDana
10 months agoLeota
10 months agoBulah
10 months agoRosio
11 months agoMelynda
11 months ago