Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
Correct Answer: C
Zero Trust Model:
Zero Trust security model assumes that threats can exist both inside and outside the network. Every access request must be authenticated, authorized, and encrypted.
Preventing Control Gaps:
A robust technical architecture ensures comprehensive and consistent security controls across the entire network.
It integrates various security measures, such as microsegmentation, strong authentication, continuous monitoring, and least privilege access, to create a unified defense strategy.
Other Options:
Relying on Multiple Solutions:Can lead to fragmentation and inconsistencies in security controls.
Utilizing Rapid Development:May introduce vulnerabilities if security is not properly integrated.
Starting with a Large Initial Scope:Can be overwhelming and difficult to manage effectively, leading to potential gaps.
References:
The CISSP Study Guide emphasizes the importance of a strong and cohesive technical architecture in implementing Zero Trust effectively (Sybex CISSP Study Guide, Chapter 8: Principles of Security Models, Design, and Capabilities) .