Which of the following pillars are key to implementing a Zero Trust architecture?

Which of the following pillars are key to implementing a Zero Trust architecture?

(Select two)
A . Network segmentation
B . Continuous monitoring and response
C . Traditional firewall protection
D . Periodic access review

Answer: AB

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments