In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
- A.Step 4: Create the Zero Trust Policy
- B.Step 3: Architect a Zero Trust Network
- C.Step 1: Define the Protect Surface
- D.Step 5: Monitor and Maintain the Network