Which option does not relate to the zero trust model?
A. secure access
B. orchestration
C. intrusion protection system
D. segmentation
Which option does not relate to the zero trust model?
A. secure access
B. orchestration
C. intrusion protection system
D. segmentation