B. Provide multiple layers of network security using a zero-trust model.
A transformational cloud adoption approach requires a shift in security thinking from a perimeter-based approach to a zero-trust approach. In a zero-trust approach, all users and devices are treated as untrusted until they are verified and authorized. This means that security is applied at every layer of the cloud environment, from the network to the application.
https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/
Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
chai_gpt
5 months, 3 weeks ago__rajan__
6 months agovimalraj02
1 year, 5 months agoBryRob
1 year, 5 months agoGovindaraj
1 year, 7 months agoKamlakar
1 year, 7 months agoWorkerG
1 year, 7 months agogrzeev
1 year, 6 months agosomeshsehgal
1 year, 4 months ago