Skip to content

Commit ee57979

Browse files
committed
fix for acrolinx
1 parent bd476fb commit ee57979

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/3-zero-trust-initiatives.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,10 @@ The framework organizes adoption around a lifecycle with five phases:
2222

2323
The framework applies the lifecycle through business scenarios that break work into concrete objectives. Each objective is a technical project that moves through the lifecycle independently, and you can stagger objectives so multiple workstreams progress in parallel. The framework includes these business scenarios:
2424

25-
- **Rapidly modernize your security posture** Build the organizational capacity and basic security hygiene needed for every other scenario.
26-
- **Secure remote and hybrid work** Apply Zero Trust protections to identities, devices, and applications for remote access.
27-
- **Identify and protect sensitive business data** Discover, classify, and protect sensitive data across your digital estate.
28-
- **Prevent or reduce business damage from a breach** Limit blast radius through segmentation, threat detection, and response capabilities.
29-
- **Meet regulatory and compliance requirements** Align Zero Trust protections with regulatory frameworks and track compliance status.
25+
- **Rapidly modernize your security posture**: Build the organizational capacity and basic security hygiene needed for every other scenario.
26+
- **Secure remote and hybrid work**: Apply Zero Trust protections to identities, devices, and applications for remote access.
27+
- **Identify and protect sensitive business data**: Discover, classify, and protect sensitive data across your digital estate.
28+
- **Prevent or reduce business damage from a breach**: Limit blast radius through segmentation, threat detection, and response capabilities.
29+
- **Meet regulatory and compliance requirements**: Align Zero Trust protections with regulatory frameworks and track compliance status.
3030

3131
The *Rapidly modernize your security posture* scenario is typically the starting point because it builds the organizational capacity—strategy alignment, risk assessment, security hygiene, and a repeatable adoption process—needed to systematically execute the other business scenarios. In turn, the other scenarios supply the technical objectives that feed through this process and accelerate the overall transformation.

0 commit comments

Comments
 (0)