A security analyst at a global financial firm was reviewing the design of a cloud-based system to identify opportunities to improve the security of the architecture. The system was recently involved in a data breach after a vulnerability was exploited within a virtual machine's operating system. The analyst observed the VPC in which the system was located was not peered with the security VPC that contained the centralized vulnerability scanner due to the cloud provider's limitations. Which of the following is the BEST course of action to help prevent this situation in the near future?
weaponxcel
Highly Voted 1 year, 1 month agoAriel235788
Highly Voted 1 year, 2 months agoBright07
Most Recent 1 day, 1 hour ago23169fd
4 months, 4 weeks agoe4af987
8 months, 1 week agoe020fdc
9 months, 4 weeks agoTrap_D0_r
11 months, 1 week agoAnarckii
11 months, 1 week agoOdinAtlasSteel
1 year agowizwiz
1 year ago32d799a
1 year, 1 month agoCXSSP
1 year, 3 months ago