
Answer-first summary for fast verification
Answer: Define and enforce comprehensive security requirements for the backup solution, including role-based access control (RBAC), data encryption in transit and at rest, data retention policies aligned with compliance standards, and schedule regular third-party security assessments.
The best approach is to define and enforce comprehensive security requirements for the backup solution. This includes implementing role-based access control (RBAC) to ensure only authorized personnel can access the backup data, encrypting data both in transit and at rest to protect against unauthorized access, establishing data retention policies that comply with industry regulations, and conducting regular security assessments to identify and mitigate vulnerabilities. Relying solely on the cloud provider's security measures or focusing only on network security does not address all the compliance and security requirements comprehensively. Implementing encryption only during transit leaves data at rest vulnerable, and neglecting to define specific security requirements can lead to gaps in the security posture.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company is planning to implement a cloud-based backup and disaster recovery solution to protect critical data across multiple Azure regions. The solution must comply with industry regulations requiring data encryption, strict access controls, and regular security audits. Additionally, the company aims to minimize costs without compromising on security. Considering these requirements, which of the following security measures should you prioritize to ensure the security and compliance of the backup data? (Choose the best option)
A
Implement end-to-end encryption for the backup data only during transit to the cloud, assuming the cloud provider ensures encryption at rest.
B
Define and enforce comprehensive security requirements for the backup solution, including role-based access control (RBAC), data encryption in transit and at rest, data retention policies aligned with compliance standards, and schedule regular third-party security assessments.
C
Focus solely on securing the network infrastructure and endpoints accessing the backup solution, leveraging Azure Firewall and Network Security Groups (NSGs) to restrict access.
D
Depend entirely on the cloud provider's built-in security features for backup data, assuming they meet all compliance and security requirements without additional configuration.
No comments yet.