Microsoft Azure Fundamentals AZ-900 Practice Question
Your company is moving sensitive workloads to Azure and the security team insists on following the Zero Trust model for securing resources. Which approach aligns with the principles of the Zero Trust security model?
Implement minimal logging and analysis since users and devices are not trusted and require constant verification.
Provide full access to all applications and services for anyone located within the corporate office.
Enforce strict user identity verification for any access request regardless of the user's location in relation to the network perimeter.
Automatically trust users and devices within the corporate network but verify those coming from external networks.