
Answer-first summary for fast verification
Answer: Apply column-level security features to allow access to sensitive columns according to roles.
Applying column-level security features to grant access to sensitive columns based on roles is the most effective method for managing sensitive data access while enabling broad use of non-sensitive data. This strategy permits control over access to specific columns that contain sensitive data, such as PII, by assigning roles and permissions to individual analysts. It ensures that only those with the necessary permissions can view or alter sensitive data. While encrypting sensitive columns and distributing decryption keys to authorized analysts (option C) offers a level of security, it lacks the granularity for column-specific access control. Storing sensitive data separately with strict access controls (option A) is effective but may not be as efficient. Anonymizing sensitive data and providing raw data access upon request (option D) may not meet the needs of analysts requiring immediate access to sensitive information. Therefore, utilizing column-level security features based on roles is the optimal strategy for balancing sensitive data protection with accessibility to non-sensitive data.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
You are responsible for creating a secure data environment where only specific analysts can access sensitive columns, like Personally Identifiable Information (PII). What approach effectively limits access to sensitive data while still permitting widespread use of non-sensitive data?
A
Store sensitive data in a separate database and implement strict access controls.
B
Apply column-level security features to allow access to sensitive columns according to roles.
C
Encrypt sensitive columns and share decryption keys exclusively with authorized analysts.
D
Anonymize sensitive data in shared datasets and grant access to raw data when requested.