December 22, 2021 by Admin
An organization is in the process of adopting a hybrid data infrastructure, transferring all non-core applications to cloud service providers and maintaining all core business functions in-house. The information security manager has determined a defense in depth strategy should be used. Which of the following BEST describes this strategy?
- Multi-factor login requirements for cloud service applications, timeouts, and complex passwords
- Deployment of nested firewalls within the infrastructure
- Separate security controls for applications, platforms, programs, and endpoints
- Strict enforcement of role-based access control (RBAC)