A security analyst at a global financial firm was reviewing the design of a cloud-based system to identify opportunities to improve the security of the architecture. The system was recently involved in a data breach after a vulnerability was exploited within a virtual machine's operating system. The analyst observed the VPC in which the system was located was not peered with the security VPC that contained the centralized vulnerability scanner due to the cloud provider's limitations. Which of the following is the BEST course of action to help prevent this situation in the near future?
weaponxcel
Highly Voted 1 year, 6 months agoCXSSP
Highly Voted 1 year, 7 months agoSteel16
Most Recent 2 months agoBright07
4 months, 4 weeks ago23169fd
9 months, 3 weeks agoe4af987
1 year, 1 month agoe020fdc
1 year, 2 months agoTrap_D0_r
1 year, 4 months agoAnarckii
1 year, 4 months agoOdinAtlasSteel
1 year, 5 months agowizwiz
1 year, 5 months ago32d799a
1 year, 6 months agoAriel235788
1 year, 7 months ago