CompTIA Security+ SY0-701 Practice Question
As a Policy Administrator in a zero trust environment, you are given the task of verifying and updating access control policies. A senior developer needs to access a secure development environment that contains sensitive code repositories. The developer already has multi-factor authentication (MFA) enabled. To adhere to the principles of zero trust, what additional action should you take before granting them access?
Move the code repository to a less secure environment to avoid access issues
Verify the user's recent activity for anomalies
Enable multi-factor authentication (MFA) for the developer
Restrict the developer's access to the environment strictly during office hours