Which of the following are key considerations in the design of a data-centric Zero Trust model?

Which of the following are key considerations in the design of a data-centric Zero Trust model?

(Select two)
A . Classifying data based on sensitivity and value
B . Implementing a perimeter-based security model
C . Regularly auditing and updating data access policies
D . Ensuring physical security of all data centers only

Answer: AC

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments