As a Policy Administrator in a zero trust environment, you are given the task of verifying and updating access control policies. A senior developer needs to access a secure development environment that contains sensitive code repositories. The developer already has multi-factor authentication (MFA) enabled. To adhere to the principles of zero trust, what additional action should you take before granting them access?
Verify the user's recent activity for anomalies
Enable multi-factor authentication (MFA) for the developer
Restrict the developer's access to the environment strictly during office hours
Move the code repository to a less secure environment to avoid access issues