
Ultimate access to all questions.
Your company is planning to migrate its customer relationship management (CRM) system to a Software as a Service (SaaS) provider. As a cybersecurity architect, you are tasked with specifying the security requirements for this SaaS service to ensure compliance with industry standards and protect sensitive customer data. The solution must address multi-factor authentication, data encryption at rest and in transit, regular security audits, and a clear incident response plan. Considering these requirements, which of the following approaches BEST ensures the security of the SaaS service? (Choose one.)
A
Delegate all security responsibilities to the SaaS provider, assuming their default security measures are sufficient for your needs.
B
Specify comprehensive security baselines for the SaaS service, including but not limited to access control, data protection standards, and incident response protocols, tailored to your company's specific requirements.
C
Focus exclusively on securing the internal network and endpoints used to access the SaaS service, neglecting the need for specific SaaS security measures.
D
Implement only basic security measures, such as strong passwords, without addressing encryption or incident response.