
Microsoft Cybersecurity Architect Expert SC-100
Get started today
Ultimate access to all questions.
Your organization is transitioning to a microservices architecture to enhance scalability and agility. As the Cybersecurity Architect, you are tasked with defining the security framework for this environment. The organization operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must support rapid scaling without compromising security. Given these constraints, which of the following approaches BEST addresses the security requirements for the microservices environment? (Choose one option.)
Your organization is transitioning to a microservices architecture to enhance scalability and agility. As the Cybersecurity Architect, you are tasked with defining the security framework for this environment. The organization operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must support rapid scaling without compromising security. Given these constraints, which of the following approaches BEST addresses the security requirements for the microservices environment? (Choose one option.)
Explanation:
A comprehensive security strategy that addresses the unique aspects of microservices, including secure communication between services, dynamic secret management, and continuous monitoring, is essential. This approach not only mitigates the increased attack surface but also ensures compliance with regulatory standards and supports scalability. Option A is incorrect because monolithic security models do not account for the distributed nature of microservices. Option B is incorrect because perimeter security alone does not protect against internal threats or ensure secure service-to-service communication. Option D is incorrect because relying solely on default settings may not meet all regulatory requirements or address specific security needs.