Management planes deployed in cloud environments may pose a risk of potentially allowing access to the entire environment. Which of the following controls is MOST appropriate for mitigating this risk?
Increased monitoring could also be a good option to detect and respond to any suspicious activity on the management plane. I'll make sure to consider that as well.
I'm a bit unsure here. Change management, audits, and monitoring all seem relevant, but I'm not sure which one is the "MOST appropriate" control. I'll have to weigh the pros and cons of each.
I heard they're developing a new control called 'Locking the Management Planes in a Vault and Throwing Away the Key'. That's the real solution, if you ask me.
Elsa
2 months agoFlorencia
2 months agoPeter
2 months agoMargot
3 months agoBeckie
3 months agoBernardo
3 months agoJamie
3 months agoIlene
4 months agoAlba
4 months agoXuan
4 months agoElfrieda
4 months agoTawna
4 months agoLouisa
4 months agoBelen
5 months agoAnisha
6 months agoRupert
7 months agoDorathy
5 months agoTimmy
5 months agoMelodie
7 months agoFernanda
7 months agoBambi
5 months agoLenna
6 months agoJules
7 months agoLorriane
7 months agoMelodie
7 months agoHarrison
7 months agoPaola
5 months agoTien
6 months agoPeter
6 months agoJules
8 months ago