As the policy administrator for an organization that has adopted a Zero Trust Architecture, you must update an access-control rule for a senior developer who needs to connect to an isolated development enclave that hosts highly sensitive source-code repositories. The developer already authenticates with multi-factor authentication (MFA). According to Zero Trust principles, which additional step should you perform immediately before granting the session?
Restrict the developer's access to the environment strictly during office hours
Analyze the developer's recent activity for behavioral anomalies
Require just-in-time approval through the change-management system
Validate the device's posture to ensure it meets current security baselines
Zero Trust requires every access request to be evaluated in real time against multiple signals. Analyzing the developer's recent behavior for anomalies helps confirm that the request matches normal usage patterns and is not coming from a hijacked account. Device posture checks, formal change-ticket approvals, and rigid office-hours windows can all strengthen security, but they do not directly validate that the current request is legitimate in the way behavior analytics does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does zero trust mean in cybersecurity?
Open an interactive chat with Bash
What are some signs of anomalies in user activity?
Open an interactive chat with Bash
Why is continuous verification important in a zero trust environment?