A company is implementing a zero trust architecture to bolster their network security. As part of this initiative, what approach should be primarily taken to ensure that authorized users are allowed access to network resources?
Provide network access to devices following a preliminary security assessment
Allow access based on user location within the enterprise premises, subject to additional verifications
Offer access based on network segment location, supplemented by user credential checks
The correct approach in a zero trust architecture is to implement policy-based authorization. In zero trust models, access decisions are based not on the physical or network location of a user, but on a set of policies that consider various context factors, such as the user's identity and the device's security status. This method ensures tight control over who can access specific resources, making the network more secure against various threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly does policy-based authorization entail in a zero trust model?
Open an interactive chat with Bash
How is 'device security status' assessed for policy-based authorization?
Open an interactive chat with Bash
What kinds of threats can a zero trust architecture mitigate more effectively?