
Answer-first summary for fast verification
Answer: Specify and implement security requirements for the virtual machines, including secure configuration, access control, and continuous monitoring to detect and respond to security incidents in real-time.
In the shared responsibility model of cloud security, while the IaaS provider is responsible for securing the underlying infrastructure, the customer is responsible for securing their data and applications within the cloud. Option B is correct because it emphasizes the importance of specifying and implementing security requirements for the virtual machines, including secure configuration, access control, and continuous monitoring. This approach ensures that security measures are tailored to the company's specific needs and compliance requirements, providing a scalable and cost-effective solution. Relying solely on the provider's security measures (Option A and D) or focusing only on the network perimeter (Option C) can leave critical vulnerabilities unaddressed.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company is planning to migrate its data storage and compute requirements to an Infrastructure as a Service (IaaS) environment in Microsoft Azure. As the Cybersecurity Architect, you are tasked with ensuring the security of your data and applications in the cloud. Considering the shared responsibility model in cloud security, cost implications, compliance requirements, and the need for scalable security measures, which of the following security requirements should you prioritize for the IaaS environment? (Choose one)
A
Implement only the security measures provided by the IaaS provider, as they are sufficient for protecting your data and applications in the cloud.
B
Specify and implement security requirements for the virtual machines, including secure configuration, access control, and continuous monitoring to detect and respond to security incidents in real-time.
C
Focus exclusively on securing the network perimeter and endpoints used to access the IaaS environment, neglecting internal security measures within the virtual machines.
D
Ensure that the IaaS provider has a strong authentication mechanism and data encryption, without any additional security measures on your part.
No comments yet.