[Governance, Risk, and Compliance (GRC)]
A security architect is mitigating a vulnerability that previously led to a web application data breach. An analysis into the root cause of the issue finds the following:
An administrator's account was hijacked and used on several Autonomous System Numbers within 30 minutes.
All administrators use named accounts that require multifactor authentication.
Single sign-on is used for all company applications.Which of the following should the security architect do to mitigate the issue?
Comprehensive and Detailed
The hijacked administrator account was used across multiple ASNs (indicating different network locations) in a short time, despite MFA and SSO. This suggests a stolen session or token misuse. Let's analyze:
A . Token theft detection with lockouts:Useful for detecting stolen SSO tokens, but it's reactive and may not prevent initial misuse across networks.
B . Context-based authentication:This adds real-time checks (e.g., geolocation, IP changes) to verify login attempts. Given the rapid ASN changes, this proactively mitigates the issue by challenging suspicious logins, aligning with CAS-005's focus on adaptive security.
C . Decentralize accounts:This removes SSO, increasing complexity and weakening MFA enforcement, which isn't practical or secure.
Ettie
2 months agoSylvia
2 months agoLuisa
2 months agoMiles
2 months agoPok
3 months agoKathrine
3 months agoShanice
3 months agoShaniqua
4 months agoChandra
4 months agoVallie
4 months agoClaudia
4 months agoShawn
4 months agoCharlie
4 months agoMelda
5 months agoTu
5 months agoValentin
5 months agoTu
5 months agoSamira
5 months agoBea
1 month agoIlene
2 months agoFrancis
2 months agoMozell
3 months agoAnglea
6 months agoFrederica
5 months ago