In which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
In which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
In the Palo Alto Networks Five-Step Zero Trust Methodology, the identification of an organization's critical data, applications, assets, and services (DAAS) is a part of Step 1: Define the protect surface. This step involves determining what needs to be protected, which includes critical DAAS, setting the foundation for the subsequent steps in implementing a Zero Trust architecture.
Step 1: Asset Discovery and Prioritization https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-1-asset-discovery-and-prioritization