In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
Step 4: Create the Zero Trust Policy
Step 3: Architect a Zero Trust Network
Step 1: Define the Protect Surface
Step 5: Monitor and Maintain the Network
Submit