
Answer-first summary for fast verification
Answer: Design the IAM solution to seamlessly integrate with the organization's existing IAM systems and utilize existing identity data, ensuring a unified access management approach across all environments.
The optimal approach involves integrating the new IAM solution with existing IAM systems and leveraging current identity data. This strategy ensures compliance, scalability, and cost-effectiveness by avoiding redundant systems and data silos. It also provides a unified access management framework that addresses the specific needs of SaaS, PaaS, IaaS, hybrid, and on-premises resources. Focusing solely on cloud resources, creating a new system from scratch, or implementing a one-size-fits-all SSO solution would not meet the organization's comprehensive security and operational requirements.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your organization is in the process of implementing a comprehensive identity and access management (IAM) solution to secure its SaaS, PaaS, and IaaS resources across cloud, hybrid, and on-premises environments. The solution must adhere to strict compliance standards, ensure scalability to accommodate future growth, and minimize operational costs. Considering these requirements, which of the following approaches should you prioritize in the design of the IAM solution? (Choose one correct option)
A
Focus exclusively on cloud-based resources, as they represent the majority of the organization's assets, to simplify the IAM solution and reduce complexity.
B
Design the IAM solution to seamlessly integrate with the organization's existing IAM systems and utilize existing identity data, ensuring a unified access management approach across all environments.
C
Develop a completely new IAM system from the ground up, disregarding existing systems, to ensure the solution is built with the latest security features and technologies.
D
Implement a universal single sign-on (SSO) solution for all resources, without tailoring the access controls to the specific security requirements of each resource type.
No comments yet.