
Ultimate access to all questions.
Your company is transitioning to a cloud-based identity and access management (IAM) solution to enhance security and streamline operations. As the Cybersecurity Architect, you are tasked with ensuring the solution is secure, compliant, and scalable. The solution must support multi-factor authentication (MFA), role-based access control (RBAC), and regular security audits. Additionally, it should comply with industry standards such as ISO 27001 and GDPR. Given these requirements, which of the following approaches BEST ensures the security and compliance of the IAM solution? (Choose one)
A
Implement only the basic security features provided by the IAM solution, as additional measures may complicate the user experience and increase costs.
B
Specify comprehensive security requirements for the IAM solution, including MFA, RBAC, encryption of data at rest and in transit, and schedule regular security assessments to identify and mitigate vulnerabilities.
C
Focus solely on network security measures, such as firewalls and intrusion detection systems, to protect the IAM solution, assuming the provider handles all other security aspects.
D
Rely entirely on the IAM solution provider's built-in security features without conducting any independent security assessments or implementing additional controls.