A security analyst at a global financial firm was reviewing the design of a cloud-based system to identify opportunities to improve the security of the architecture. The system was recently involved in a data breach after a vulnerability was exploited within a virtual machine's operating system. The analyst observed the VPC in which the system was located was not peered with the security VPC that contained the centralized vulnerability scanner due to the cloud provider's limitations. Which of the following is the BEST course of action to help prevent this situation in the near future?
weaponxcel
Highly Voted 1 year, 2 months agoAriel235788
Highly Voted 1 year, 3 months agoBright07
Most Recent 1 month ago23169fd
6 months agoe4af987
9 months, 2 weeks agoe020fdc
11 months agoTrap_D0_r
1 year agoAnarckii
1 year agoOdinAtlasSteel
1 year, 1 month agowizwiz
1 year, 1 month ago32d799a
1 year, 2 months agoCXSSP
1 year, 4 months ago