You have legacy operational technology (OT) devices and IoT devices.
You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.
Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
El_m_o
Highly Voted 2 years, 5 months agodsatizabal
7 months agoAjdlfasudfo0
Highly Voted 2 years, 5 months agodanb67
Most Recent 1 year, 1 month agoemartiy
1 year, 1 month agoBaz10
1 year, 4 months agoCharly80
1 year, 7 months agoFunkydave
1 year, 10 months agoPOOJI123
2 years agotheplaceholder
1 year, 11 months agoArio
2 years, 1 month agozellck
2 years, 2 months agoTictactoe
2 years, 3 months agoPrettyFlyWifi
2 years, 4 months agoedurakhan
2 years, 4 months agozellck
2 years, 2 months agoGeVanDerBe
2 years, 3 months agoFal991l
2 years, 5 months agoFal991l
2 years, 5 months agoaks_exam
1 year, 6 months agoAJ2021
2 years, 5 months ago