In applying Zero Trust principles to the cloud, what is crucial for controlling access to resources?

In applying Zero Trust principles to the cloud, what is crucial for controlling access to resources?
A . Granting access based on the physical location of the user
B . Providing universal access to simplify management
C . Dynamic access control based on continuous verification
D . Relying solely on traditional VPNs for remote access

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments