Sometimes authorized and allowed initiators may request malicious access to services. What would be the best policy enforcement for an enterprise?
Connections approved by the Zero Trust Exchange must then enable permanent network-level access for at least 30 days.