A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
Agree, the mapping of an identity to an authorization should be documented in an entitlement matrix. That document outlines the various resources and functions allowed to be used by specific users, groups and roles.
For me its A, entitlement matrix. but i'm confused for "5.1.2.2 Process. Perform a transaction on the data; update it; use it in a business processing transaction, etc." The questions says "entities in a transaction"
For me this has to be an entitlement matrix. "Validation process" is not even a term that appears in the Security Guidance.
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ICEYNYSE
Highly Voted 1 year, 7 months agoNSK_12
Highly Voted 1 year, 8 months agoassfedassfinished
Most Recent 2 months, 1 week agoBigG83
4 months agojuanescast
9 months, 3 weeks agoFripper
1 year, 2 months agoMobi333
1 year, 2 months agoSelmed993
1 year, 2 months agoMichael_B_Morell_CISSP
1 year, 6 months agobeazzlebub
1 year, 8 months ago