As a Policy Administrator in a zero trust environment, you are given the task of verifying and updating access control policies. A senior developer needs to access a secure development environment that contains sensitive code repositories. The developer already has multi-factor authentication (MFA) enabled. To adhere to the principles of zero trust, what additional action should you take before granting them access?
Enable multi-factor authentication (MFA) for the developer
Restrict the developer's access to the environment strictly during office hours
Verify the user's recent activity for anomalies
Move the code repository to a less secure environment to avoid access issues
|General Security Concepts
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight