
Ultimate access to all questions.
Your organization is planning to implement a centralized logging and auditing solution using Microsoft Purview Audit to enhance its security posture. The solution must comply with industry regulations, ensure data privacy, and be scalable to accommodate future growth. As the Cybersecurity Architect, you are tasked with designing this solution. Which of the following considerations is MOST critical to include in your design to meet these requirements? (Choose one correct option)
A
Connecting all relevant data sources to Purview Audit and configuring data retention policies that align with compliance requirements.
B
Implementing detailed alerts and notifications for specific security events to enable quick response, while ensuring audit logs are stored in a manner that facilitates easy access and analysis.
C
Applying strict access controls and encryption to audit logs to protect sensitive information from unauthorized access, in line with data privacy laws.
D
All of the above, as each consideration plays a vital role in achieving a compliant, secure, and scalable centralized logging and auditing solution.