A security architect is making recommendations for a new system that will be built to store and exchange health records. The application will be a single-page application that calls server-side, web-based API endpoints. Due to compliance implications, the system must meet the following security requirements:
• Resistance to session takeover attacks
• Able to revoke access if a system compromise is suspected
• Able to authenticate the user by employing best practices
Which of the following should the architect do to best meet the requirements?
Bright07
3 months ago