A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application’s database. The attacks occur periodically and usually after the release of a new application’s version. The following log confirms the compromise:
The following actions are made after every incident occurrence:
• Validation of firewall rules
• Scripted rebuild of the database and web instances
• Application deployment from a cloud code repository
Which of the following actions will most likely prevent future compromises?
BigM
5 months, 2 weeks agoRjimbo
8 months, 2 weeks ago