Answer D: Step 2
You have to MAP, to define the access
https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology
important words are "app access" and "user access" https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-4-implementation#id8af03732-03e2-404a-9030-dfb63dfabffd
D, Map the transactions between users, applications, and data, so that you can verify and inspect those transactions. Map:
Which applications have access to which critical data.
Which users have access to those applications.
Which users and applications have access to which infrastructure.
In step 2 is defined: Which applications have access to which critical data, which users have access to those applications and which users and applications have access to which infrastructure.
https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-2-map-the-protect-surface-transaction-flows
Step four is the implementation of securty rules based on definitions of previous steps.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
76076a1
6 months agoJerar
11 months agoOdorka222
1 year agoMicutzu
1 year, 1 month agoLostatSea
1 year, 9 months agoArangoTopics
1 year, 10 months ago