
Answer-first summary for fast verification
Answer: Specify comprehensive security requirements for the IAM solution, including MFA, RBAC, encryption of data at rest and in transit, and schedule regular security assessments to identify and mitigate vulnerabilities.
The BEST approach is to specify comprehensive security requirements for the IAM solution, including MFA for secure authentication, RBAC for precise access control, encryption for data protection, and regular security assessments to ensure ongoing security and compliance. This approach addresses the need for a secure, compliant, and scalable IAM solution by not only leveraging the provider's capabilities but also enforcing additional security measures tailored to the company's specific needs and regulatory requirements. Relying solely on the provider's features or focusing only on network security does not fully address the comprehensive security needs of an IAM solution.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company is transitioning to a cloud-based identity and access management (IAM) solution to enhance security and streamline operations. As the Cybersecurity Architect, you are tasked with ensuring the solution is secure, compliant, and scalable. The solution must support multi-factor authentication (MFA), role-based access control (RBAC), and regular security audits. Additionally, it should comply with industry standards such as ISO 27001 and GDPR. Given these requirements, which of the following approaches BEST ensures the security and compliance of the IAM solution? (Choose one)
A
Implement only the basic security features provided by the IAM solution, as additional measures may complicate the user experience and increase costs.
B
Specify comprehensive security requirements for the IAM solution, including MFA, RBAC, encryption of data at rest and in transit, and schedule regular security assessments to identify and mitigate vulnerabilities.
C
Focus solely on network security measures, such as firewalls and intrusion detection systems, to protect the IAM solution, assuming the provider handles all other security aspects.
D
Rely entirely on the IAM solution provider's built-in security features without conducting any independent security assessments or implementing additional controls.
No comments yet.