Ensure that your privileged identities have extra protection and are accessed only with the least amount of access needed to do the job.
By the end of this module, you'll be able to:
- Describe Zero Trust and how it impacts security
- Configure and deploy roles using Privileged Identity Management (PIM)
- Evaluate the usefulness of each PIM setting as it relates to your security goals