A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.
Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?
great_lake1231
Highly Voted 2 years, 11 months agoMr_BuCk3th34D
Highly Voted 2 years, 6 months ago23169fd
Most Recent 1 year agoBiteSize
1 year, 12 months agoBreakOff874
2 years, 2 months agoAlenKumar
2 years, 6 months agokycugu
2 years, 7 months agodangerelchulo
2 years, 10 months agoukuwai
2 years, 10 months agogreat_lake1231
3 years agoRevZig67
3 years, 2 months ago