You have legacy operational technology (OT) devices and IoT devices.
You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.
Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
El_m_o
Highly Voted 2 years, 3 months agodsatizabal
5 months agoAjdlfasudfo0
Highly Voted 2 years, 4 months agodanb67
Most Recent 12 months agoemartiy
12 months agoBaz10
1 year, 2 months ago[Removed]
1 year, 3 months agoCharly80
1 year, 5 months agoFunkydave
1 year, 8 months agoPOOJI123
1 year, 10 months agotheplaceholder
1 year, 10 months agoArio
1 year, 11 months agozellck
2 years, 1 month agoTictactoe
2 years, 1 month agoPrettyFlyWifi
2 years, 2 months agoedurakhan
2 years, 2 months agozellck
2 years, 1 month agoGeVanDerBe
2 years, 1 month agoFal991l
2 years, 3 months agoFal991l
2 years, 3 months agoaks_exam
1 year, 4 months agoAJ2021
2 years, 3 months ago