Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
For a data pipeline that spans multiple systems and requires end-to-end encryption to ensure data confidentiality, which strategy ensures that data remains encrypted throughout the process, only being decrypted by authorized end systems?
A
Utilize transport layer security (TLS) across all components of the pipeline, relying on network encryption to secure data in transit.
B
Implement format-preserving encryption to maintain data usability across the pipeline while ensuring that data is encrypted at rest and in transit, with decryption keys accessible only within secure execution environments.
C
Apply a uniform encryption standard (e.g., AES) at the source and manage encryption keys through a centralized key management system, allowing only authorized services to access decryption keys based on their roles.
D
Encrypt data at the source using public key infrastructure (PKI), ensuring that only the destination system has the corresponding private key for decryption.