The information security manager has determined a defense in depth strategy should be used. Which of the following BEST describes this strategy?

December 22, 2021 by Admin

An organization is in the process of adopting a hybrid data infrastructure, transferring all non-core applications to cloud service providers and maintaining all core business functions in-house. The information security manager has determined a defense in depth strategy should be used. Which of the following BEST describes this strategy?

  • Multi-factor login requirements for cloud service applications, timeouts, and complex passwords
  • Deployment of nested firewalls within the infrastructure
  • Separate security controls for applications, platforms, programs, and endpoints
  • Strict enforcement of role-based access control (RBAC)

Leave a Reply