
Ultimate access to all questions.
As a Microsoft Cybersecurity Architect, you are designing a solution for a manufacturing organization that processes sensitive data related to national security and must comply with the International Traffic in Arms Regulations (ITAR). The solution must enforce security controls in the Azure environment to ensure ITAR compliance, with considerations for real-time monitoring, alerting, and remediation of security issues. Which of the following approaches BEST meets these requirements? (Choose one)
A
Create custom Azure Policy definitions tailored to enforce specific security configurations for Azure services processing sensitive data, including encryption, network security, and access controls, without integrating additional monitoring tools.
B
Assign built-in Azure Policy initiatives focused on general industry standards like NIST SP 800-171 to resource groups, assuming these will fully address ITAR's specific requirements without further customization.
C
Utilize Azure Policy solely for auditing data processing activities and generating compliance reports, neglecting real-time security monitoring and alerting capabilities.
D
Integrate Azure Policy with Azure Monitor and Azure Security Center to not only enforce security configurations but also enable real-time monitoring, alerting, and remediation of security issues related to sensitive data processing.