In the context of applying identity-based Zero Trust, which practices are critical?

In the context of applying identity-based Zero Trust, which practices are critical?

(Select two)
A . Regularly updating and simplifying user passwords
B . Implementing least privilege access for all users
C . Continuous monitoring of user activities and access patterns
D . Assigning the same access rights to all users to prevent discrimination

Answer: BC

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments