Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure access is granted properly?
-C
The most appropriate cloud feature to ensure access is granted properly is resource policies.
Resource policies are a powerful tool for managing access to cloud resources. They allow cloud security engineers to specify permissions and restrictions at a granular level, controlling access to specific resources or actions within the cloud environment. By using resource policies, cloud security engineers can implement a fine-grained access control system that can help prevent unauthorized access to sensitive data.
API integrations (option A) are used to connect different cloud services and applications, but they are not directly related to managing access to cloud resources.
Auditing (option B) is used to track changes and access to cloud resources, but it does not directly control access to those resources.
Virtual networks (option D) are used to isolate and secure network traffic within the cloud environment, but they are not directly related to managing access to cloud resources.
Resource policies in cloud security are used to govern access and permissions for specific cloud resources, such as virtual machines, storage accounts, and databases. These policies allow cloud security engineers to define rules that control access and actions on these resources, ensuring that only authorized users and systems can interact with them.
Resource policies are commonly used in cloud environments to enforce security controls and compliance requirements, such as restricting access to sensitive data, enforcing encryption, or enforcing geographic data residency rules. These policies are enforced at the cloud provider level, meaning that the access controls and permissions are managed by the cloud provider rather than by individual users or organizations.
" These policies are enforced at the cloud provider level, meaning that the access controls and permissions are managed by the cloud provider rather than by individual users or organizations." is wrong.
Resource policies are typically defined and managed by the cloud customer (user or organization) to control access to their own resources within the cloud environment. Cloud providers offer mechanisms for customers to set and manage these policies. These policies define who can access the resources, what actions they can perform on those resources, and under what conditions.
For example, in Amazon Web Services (AWS), customers can use AWS Identity and Access Management (IAM) policies to control access to their resources. Similarly, in Microsoft Azure, customers can use Azure Role-Based Access Control (RBAC) policies, and in Google Cloud, customers can use Google Cloud Identity and Access Management (IAM) policies.
Cloud storage services require permissions just like any resource. File servers need permissions. Mail servers need permissions. You get the idea. Cloud service providers—let’s just say AWS, as Amazon invented this term—call their permissions resource policies. A policy is an object in AWS that defines the permissions to an identity or resource. AWS defines two types of resource policies: identity-based policies and resource-based policies.
Identity-based policies are assigned to users, groups, or roles. Resource-based policies are attached to a resource."
-Mike Meyers' Security+ Certification Guide Third Edition SY0-601
Resource policies would be the most appropriate feature to ensure access is granted properly. Resource policies allow you to specify who has access to your resources and what actions they can perform on those resources.
Resource policies would be the most appropriate cloud feature to ensure that access is granted properly. Resource policies are used to define who can access specific resources and what actions they can perform on those resources. By configuring resource policies, cloud security engineers can control access to specific features and increase data security.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
mouettespaghetti
Highly Voted 2Â years, 1Â month agoApplebeesWaiter1122
Highly Voted 2Â years, 1Â month agoje123
1Â year, 10Â months agoisha_a
Most Recent 1Â year, 7Â months agoLeonardSnart
1Â year, 12Â months agocablebox
2Â years agostaoic
2Â years, 1Â month agoKnifeClown1
2Â years, 1Â month agofouserd
2Â years, 1Â month ago