
Ultimate access to all questions.
Your company is planning to migrate its data storage and compute requirements to an Infrastructure as a Service (IaaS) environment in Microsoft Azure. As the Cybersecurity Architect, you are tasked with ensuring the security of your data and applications in the cloud. Considering the shared responsibility model in cloud security, cost implications, compliance requirements, and the need for scalable security measures, which of the following security requirements should you prioritize for the IaaS environment? (Choose one)
A
Implement only the security measures provided by the IaaS provider, as they are sufficient for protecting your data and applications in the cloud.
B
Specify and implement security requirements for the virtual machines, including secure configuration, access control, and continuous monitoring to detect and respond to security incidents in real-time.
C
Focus exclusively on securing the network perimeter and endpoints used to access the IaaS environment, neglecting internal security measures within the virtual machines.
D
Ensure that the IaaS provider has a strong authentication mechanism and data encryption, without any additional security measures on your part.