Summary

Completed

In this module, you've learned about applications and how shadow IT can impact the security of your organization. You've also seen how to use the Zero Trust approach to protect applications through a series of measures. These include discovering and controlling the use of shadow IT, protecting sensitive information and activities automatically, assessing the security posture of your cloud environments, and more.

Now that you've completed this module, you should be able to:

  • Describe cloud applications.
  • Describe shadow IT and its impact.
  • Describe how to secure applications with a Zero Trust framework.