A. Cloud Access Security Brokers (CASBs)
B. Distinct identity providers for cloud and on-premises systems
C. Unified endpoint management (UEM) systems
D. Dedicated physical firewalls for each network segment
A. Assigning the same access rights to all users to prevent discrimination
B. Regularly updating and simplifying user passwords
C. Continuous monitoring of user activities and access patterns
D. Implementing least privilege access for all users
A. Create user activity log details.
B. Calculate and communicate the trust score.
C. Automatically update security policies
D. Identify user credentials.
A. Relies solely on user authentication for data protection
B. Enforces access controls based on data type
C. Requires the encryption of all network traffic
D. Customizes access controls based on data sensitivity
A. To solely comply with regulatory standards.
B. To prevent data breaches by verifying every access request, regardless of location.
C. To better manage remote access.
D. To reduce the complexity of IT infrastructure.
A. Least Privilege access
B. Encryption
C. Multi-factor authentication (MFA)
D. User Biometrics
E. Secure SSH
A. Only on-premises data is encrypted for regulatory compliance.
B. Encryption is deemed unnecessary due to the presence of other security measures.
C. Data is only encrypted in transit but not at rest to conserve resources.
D. Encryption is applied to data at rest and in transit, regardless of location.
A. Automation and Orchestration
B. Data
C. Network and Environment
D. User
A. Decreased importance of network perimeter security.
B. The desire for simpler network architectures.
C. Increasing incidents of insider threats.
D. The shift towards cloud-based services and remote work.
A. Apply least privilege access.
B. Trust entities within the network perimeter.
C. Always trust but verify periodically.
D. Assume breach and verify explicitly.