Having a hardtime to understand how "Security Policies" could be the BEST way to protect an organization's data assets.
If we don't have technical controls in place - users tend to just do wheterver. Imagine having a policy that says change your password every 90 days. How many people will do that? But if GPO expires their password.... they will change it right way.
For you to have the technical controls in place, you must have already developed policies and procedures which lay the foundation for how the technical controls are to be implemented. Technical control implementation is the reflection of your policies.
SOLID B .... it's more like changing the culture . Even if you use encryption at rest or in transit they can write the data down on a a sticky note , share their screen with third parties , use their cellphone and take snaps of their work computer with confidential data displayed , get hooked on a social engineering scam etc . It all boils down to the the people at the end of the day and their respect for the policy either through pure logic or out of fear of disciplinary actions (enforcement) .
While monitoring and enforcing security policies (option B) is crucial for overall security, encryption directly protects the confidentiality and integrity of data by ensuring that unauthorized individuals cannot access or alter the data. Encryption of both data in transit and data at rest provides a robust layer of protection, especially in case of data breaches or unauthorized access.
In contrast, enforcing security policies (option B) helps manage and guide actions, but without encryption, data might still be vulnerable even if policies are in place.
Therefore, option A is the best choice
The best answer is:
A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms.
Explanation:
While all the options contribute to security, encryption is the most fundamental and effective way to protect data assets from unauthorized access, even if other security controls fail. Proper encryption ensures data confidentiality and integrity, whether it is stored (at rest) or transmitted (in transit).
• B (Monitor and enforce adherence to security policies): This is important but does not directly protect data assets—it’s more about governance and compliance.
• C (Require MFA and Separation of Duties): These measures strengthen access control but do not directly protect data at rest or in transit.
• D (Create a DMZ with proxies, firewalls, and bastion hosts): This helps protect network boundaries but does not directly safeguard stored or transmitted data.
Encryption remains the most effective safeguard for data security across various attack vectors.
When choosing answers, the order of priority should be People, Processes, Technology....Technology usually goes last. Think like a manager on this one.
While all of these measures are important parts of a comprehensive security strategy, encryption, op A provides the most direct and fundamental protection for the data itself. It ensures that even if other security measures fail or data is somehow accessed, it remains unreadable and protected. This makes it the BEST way to protect an organization's data assets among the given options.
Is encryption enough to protect the data assets?
There should be broader policies such as protection against tempering of the data or a web application firewall if there is a possibility of a SQL injection for example that could reveal the protected data to the attacker. Or the attacker can just delete the encrypted data. Therefore solely encrypting data isn't correct even from the technical perspective.
encrypting the data at rest and in transit is great for those who are unauthorized. However, the question is not that specific, reading that it applies to all types of users (authorized and not). When accounting for this interpretation of the question, B makes more sense. Additionally, B doesn't JUST list having or monitoring a policy, it is specific to also say enforce which implies technical controls.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
godchild
Highly Voted 2 years, 5 months agowins34
1 year agojackdryan
1 year, 10 months agofranbarpro
2 years, 5 months agoYohanes411
1 month, 2 weeks agoFredDurst
5 months agoN00b1e
2 years, 5 months agoDButtare
Highly Voted 2 years, 5 months agoiRyae
Most Recent 1 week, 1 day agokarincauk
1 week, 6 days agoBau24
2 weeks agoeasyp
3 weeks, 4 days agoYohanes411
1 month, 2 weeks agoimather
1 month, 3 weeks agoScheds
1 month, 3 weeks agoV_raven
2 months, 1 week agoMoose01
2 months, 3 weeks agonuggetbutts
3 months, 2 weeks agosomsom
4 months, 1 week agocelomomo
4 months, 3 weeks agojens23
5 months agoCCNPWILL
5 months agoGPrep
5 months ago