Question & Answer
Question
In this video, you hear about the placement of applications and workloads in the context of Zero Trust. The presentation applies the principles of zero trust, Never trust, always verify, Eliminate perimeter-based controls, and Continuously improve to application and workload. This perspective is one piece of realizing zero trust, which is a journey, not a destination.
Duration: 21 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy
Answer
The Security Learning Academy is a full service learning platform, providing various training objects and instruction options.
Related Information
[{"Business Unit":{"code":"BU008","label":"Security"},"Product":{"code":"SSQTTJ","label":"IBM Security Education"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" "}]
Was this topic helpful?
Document Information
Modified date:
21 September 2023
UID
ibm16537284