As the policy administrator for an organization that has adopted a Zero Trust Architecture, you must update an access-control rule for a senior developer who needs to connect to an isolated development enclave that hosts highly sensitive source-code repositories. The developer already authenticates with multi-factor authentication (MFA). According to Zero Trust principles, which additional step should you perform immediately before granting the session?
Validate the device's posture to ensure it meets current security baselines
Require just-in-time approval through the change-management system
Restrict the developer's access to the environment strictly during office hours
Analyze the developer's recent activity for behavioral anomalies
Zero Trust requires every access request to be evaluated in real time against multiple signals. Analyzing the developer's recent behavior for anomalies helps confirm that the request matches normal usage patterns and is not coming from a hijacked account. Device posture checks, formal change-ticket approvals, and rigid office-hours windows can all strengthen security, but they do not directly validate that the current request is legitimate in the way behavior analytics does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'device posture' mean in the context of Zero Trust?
Open an interactive chat with Bash
How does behavioral analysis confirm the legitimacy of an access request?
Open an interactive chat with Bash
Why is multi-factor authentication (MFA) alone insufficient in Zero Trust?