A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
The best recommendation to reduce the risk of data leakage when a vendor requires privileged access to a key business application is to implement real-time activity monitoring for privileged roles. Real-time monitoring enables the organization to immediately track and analyze the actions taken by privileged users, including vendors. This helps in early detection and response to any unauthorized or suspicious activities, thereby mitigating potential security threats and reducing the risk of data leakage.
Implementing real-time activity monitoring for privileged roles is the best recommendation to reduce the risk of data leakage in this scenario. Real-time monitoring allows organizations to track and analyze the activities performed by privileged users, including vendors, in critical applications. This helps detect any unauthorized or suspicious actions promptly, allowing for a quick response to potential security threats.
By performing a review of privileged roles and responsibilities, you can ensure that when a vendor requires privileged access to critical business applications, the privileges are appropriately restricted to the minimum necessary. This removes unnecessary privileges and reduces the risk of data leakage. In the case of B, it is important to monitor privileged role activity in real time, but a review to ensure that privileges are assigned appropriately is the first step.