The Chief Security Officer (CISO) at a multinational banking corporation is reviewing a plan to upgrade the entire corporate IT infrastructure. The architecture consists of a centralized cloud environment hosting the majority of data, small server clusters at each corporate location to handle the majority of customer transaction processing, ATMs, and a new mobile banking application accessible from smartphones, tablets, and the Internet via HTTP. The corporation does business having varying data retention and privacy laws.
Which of the following technical modifications to the architecture and corresponding security controls should be implemented to provide the MOST complete protection of data?
Hot_156
Highly Voted 5 years, 1 month agoHanzero
Highly Voted 4 years, 9 months agoCyberDog
Most Recent 3 years, 11 months agoFNavarro
4 years, 4 months agoBelmondo
4 years, 6 months agoMichaelLangdon
4 years, 7 months agoMichaelLangdon
4 years, 7 months agosilentnotifications
4 years, 8 months agohlwo
4 years, 9 months agoDimitricl
4 years, 10 months agothefoxx
4 years, 11 months agorameces
4 years, 10 months agokdce
5 years agoAWS_NEWBIE_2020
5 years, 1 month ago