Ultimate access to all questions.
Your organization is implementing a Zero Trust security model and is in the process of validating the alignment of its Conditional Access policies with this strategy. The organization operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the organization aims to minimize operational costs while ensuring scalability across its global operations. Which of the following steps should be avoided during the validation process to ensure the Conditional Access policies effectively support the Zero Trust strategy, considering the organization's constraints? (Choose one option)