An organization adopts a Zero Trust model and removes implicit trust between internal network segments. Shortly after deployment, several business-critical applications experience latency and intermittent access failures.
Leadership questions whether the Zero Trust initiative should be rolled back.
What should the security architect do FIRST?
A. Roll back Zero Trust controls to restore application performance
B. Perform a targeted assessment to identify policy enforcement points causing disruption
C. Permanently whitelist affected applications to bypass Zero Trust controls
D. Escalate the issue to vendors to redesign the Zero Trust architecture