Your organization's CIO is concerned about the increasing number of security breaches and wants to enhance the security posture. She is interested in implementing a security model that assumes threats can come from inside or outside the network and requires continuous validation for access requests.
What security approach should you recommend adopting in your Microsoft 365 environment?
Rely on endpoint security solutions like antivirus and anti-malware software.
Implement a perimeter-based security model focusing on network firewalls.
Enable single sign-on (SSO) to simplify user authentication processes.
Adopt a Zero Trust security model that requires continuous authentication and authorization.