A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
A.
Perform a review of privileged roles and responsibilities.
B.
Implement real-time activity monitoring for privileged roles.
C.
Require the vendor to implement job rotation for privileged roles.
D.
Include the right-to-audit in the vendor contract.
By performing a review of privileged roles and responsibilities, you can ensure that when a vendor requires privileged access to critical business applications, the privileges are appropriately restricted to the minimum necessary. This removes unnecessary privileges and reduces the risk of data leakage.
In the case of B, it is important to monitor privileged role activity in real time, but a review to ensure that privileges are assigned appropriately is the first step.
Implementing real-time activity monitoring for privileged roles is the best recommendation to reduce the risk of data leakage in this scenario. Real-time monitoring allows organizations to track and analyze the activities performed by privileged users, including vendors, in critical applications. This helps detect any unauthorized or suspicious actions promptly, allowing for a quick response to potential security threats.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Swallows
4 months, 3 weeks agoPurpleParrot
1 month, 1 week agoFAGFUR
1 year ago