In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?
In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?
Inspection and logging of all traffic take place in Step 5: Monitor and maintain the network. This step focuses on continuous monitoring and analysis to ensure that the Zero Trust policies are functioning as intended and that any anomalous activities are promptly detected and addressed.
Agree with D, see below: https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-5-monitor-and-maintain-the-network
D, step 5