Question 1 of 25Design Secure Architectures
A healthcare company needs to implement zero-trust architecture for a HIPAA-compliant application. The solution must ensure end-to-end encryption, network microsegmentation, and detailed audit logging. Which comprehensive security approach is most appropriate?