What security model involves granting access to resources based on the identity of the user and their attributes?
Encryption
Zero-trust security
Network segmentation
Identity and access management (IAM)

Cloud Networking Exercises are loading ...