In a data-centric Zero Trust model, how should access to sensitive data be handled?

In a data-centric Zero Trust model, how should access to sensitive data be handled?
A . By granting access to anyone who requests it, to avoid bottlenecks
B . Based on a static role assigned at the time of employment
C . Through dynamic access controls that adjust based on real-time risk assessments
D . By using a universal access code for all users to simplify management

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments