Question: 57
Which of the following mitigation techniques, best limits th...
Scenario:
Your company has recently adopted a multi-cloud strategy to leverage the benefits of different cloud service providers. Shortly after the migration, the security operations center (SOC) noticed a spike in unauthorized data access attempts and potential data exposures. A preliminary audit revealed that several cloud resources, including virtual machines and storage buckets, had incorrect access settings. Additionally, some services were inadvertently left exposed to the public internet due to improper configuration.
Question:
Given that 80% of cloud vulnerabilities are due to misconfigurations, which of the following actions should your security team prioritize to most effectively reduce the risk of future cloud security incidents?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!