In which step of the Five-Step Methodology for implementing the Zero Trust model are the services most valuable to the company defined?
In which step of the Five-Step Methodology for implementing the Zero Trust model are the services most valuable to the company defined?
In the first step of the Five-Step Methodology for implementing the Zero Trust model, 'Define the protect surface', the services and assets most valuable to the company are identified and defined. This step involves understanding what critical data, applications, assets, and services (DAAS) need to be protected and is foundational for building a Zero Trust architecture.
Agree with answer D: https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-1-asset-discovery-and-prioritization
Agree with yet_another_user, so D.