
Ultimate access to all questions.
Your organization is transitioning to a microservices architecture to enhance scalability and agility. As the Cybersecurity Architect, you are tasked with defining the security framework for this environment. The organization operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must support rapid scaling without compromising security. Given these constraints, which of the following approaches BEST addresses the security requirements for the microservices environment? (Choose one option.)
A
Implement a monolithic security model across all microservices, leveraging existing security tools without modification, to ensure consistency and reduce complexity.
B
Deploy a perimeter-based security model only, assuming internal service-to-service communication within the microservices architecture is inherently secure and does not require additional safeguards.
C
Adopt a comprehensive security strategy that includes secure service-to-service communication, dynamic secret management, and continuous monitoring to address the unique challenges of microservices, such as the expanded attack surface and compliance requirements.
D
Rely solely on the cloud provider's default security settings for microservices, assuming they are fully compliant with industry regulations and adequately protect against all potential threats.