Question: An organization utilizing Zero Trust Architecture ( ZTA ) detects unusual behavior in a user's account, which is attempting to access highly confidential project documents

An organization utilizing Zero Trust Architecture (ZTA) detects unusual behavior in a user's account, which is attempting to access highly confidential project documents late at night. The user's account typically accesses these documents during standard working hours.
Based on ZTA principles, how should the system respond to this request?
answer
Deny access and alert the security team to investigate the unusual behavior.
Request additional authentication from the user before granting access.
Allow access but monitor the user's activity closely for any further unusual behavior.
Automatically allow access, assuming the user's identity has been compromised and needs investigation.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!