CompTIA Security+ SY0-701 Practice Question
As a Policy Administrator in a zero trust environment, you are given the task of verifying and updating access control policies. A senior developer needs to access a secure development environment that contains sensitive code repositories. The developer already has multi-factor authentication (MFA) enabled. To adhere to the principles of zero trust, what additional action should you take before granting them access?
Restrict the developer's access to the environment strictly during office hours
Enable multi-factor authentication (MFA) for the developer
Verify the user's recent activity for anomalies
Move the code repository to a less secure environment to avoid access issues