Answer D: Step 2
You have to MAP, to define the access
https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology
important words are "app access" and "user access" https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-4-implementation#id8af03732-03e2-404a-9030-dfb63dfabffd
D, Map the transactions between users, applications, and data, so that you can verify and inspect those transactions. Map:
Which applications have access to which critical data.
Which users have access to those applications.
Which users and applications have access to which infrastructure.
In step 2 is defined: Which applications have access to which critical data, which users have access to those applications and which users and applications have access to which infrastructure.
https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-2-map-the-protect-surface-transaction-flows
Step four is the implementation of securty rules based on definitions of previous steps.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
76076a1
2 months, 3 weeks agoJerar
7 months, 4 weeks agoOdorka222
9 months, 1 week agoMicutzu
9 months, 3 weeks agoLostatSea
1 year, 6 months agoArangoTopics
1 year, 6 months ago