
Answer-first summary for fast verification
Answer: Regularly rotate encryption keys stored in Cloud Key Management Service (KMS) for enhanced security.
Storing encryption keys in Cloud Key Management Service (KMS) and rotating them periodically is the most secure approach. KMS offers a robust platform for key management, featuring audit logs, automatic key deletion, and key rotation. These measures significantly reduce the risk and impact of potential breaches by limiting unauthorized access duration.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
To safeguard sensitive information in an application deployment, minimizing exposure risks during a breach is crucial. Which strategies effectively enhance data security?
A
Leverage a continuous build pipeline to generate various secret versions for each application instance.
B
Incorporate Single Sign-On (SSO) for the application, keeping secrets hidden from it.
C
At instance creation, inject the secret through an encrypted configuration management system.
D
Regularly rotate encryption keys stored in Cloud Key Management Service (KMS) for enhanced security.