The correct answer is B. Controlling content and access. In the Zero Trust architecture sequence used throughout this question set, the first stage is to verify identity and context , which means establishing who is requesting access and under what conditions. After that, the second stage is to control content and access . This is where the architecture determines what the user is trying to reach, what content is involved, what protections are needed, and what level of access should be permitted.
This stage goes beyond identity alone. A user may be validly authenticated, but the connection may still require inspection, isolation, restriction, or denial depending on the destination, the application type, the transaction content, or the enterprise’s policy. That is why content-aware security and granular access control are central to this second stage.
Two-factor authentication belongs within verification, not the second stage itself. Simply seeing where traffic is going is only one small input and does not describe the full stage. Threat-actor analysis is a supporting security activity, not the named Zero Trust stage. Therefore, the second stage is controlling content and access .
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit