Isaca CCOA Question Answer
Which of the following is foundational for implementing a Zero Trust model?
Comprehensive process documentation
Robust network monitoring
Routine vulnerability and penetration testing
Identity and access management (IAM) controls
Implementing aZero Trust modelfundamentally requires robustIdentity and Access Management (IAM)controls because:
Zero Trust Principles:Never trust, always verify; enforce least privilege.
Identity-Centric Security:Strong IAM practices ensure that only authenticated and authorized users can access resources.
Multi-Factor Authentication (MFA):Verifying user identities at each access point.
Granular Access Control:Assigning minimal necessary privileges based on verified identity.
Continuous Monitoring:Continuously assessing user behavior and access patterns.
Other options analysis:
A. Comprehensive process documentation:Helpful but not foundational for Zero Trust.
B. Robust network monitoring:Supports Zero Trust but is not the core principle.
C. Routine vulnerability and penetration testing:Important for security but not specifically for Zero Trust.
CCOA Official Review Manual, 1st Edition References:
Chapter 7: Access Control and Identity Management:Emphasizes the role of IAM in Zero Trust architecture.
Chapter 10: Secure Network Architecture:Discusses how Zero Trust integrates IAM.
TESTED 02 Aug 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved