You have legacy operational technology (OT) devices and IoT devices.
You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.
Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
El_m_o
Highly Voted 2 years, 2 months agodsatizabal
3 months, 2 weeks agoAjdlfasudfo0
Highly Voted 2 years, 2 months agodanb67
Most Recent 10 months, 1 week agoemartiy
10 months, 1 week agoBaz10
1 year ago[Removed]
1 year, 1 month agoCharly80
1 year, 3 months agoFunkydave
1 year, 7 months agoPOOJI123
1 year, 8 months agotheplaceholder
1 year, 8 months agoArio
1 year, 10 months agozellck
1 year, 11 months agoTictactoe
1 year, 12 months agoPrettyFlyWifi
2 years agoedurakhan
2 years agozellck
1 year, 11 months agoGeVanDerBe
2 years agoFal991l
2 years, 1 month agoFal991l
2 years, 1 month agoaks_exam
1 year, 2 months agoAJ2021
2 years, 1 month ago