A security engineer is reviewing a record of events after a recent data breach incident that involved the following:
✑ A hacker conducted reconnaissance and developed a footprint of the company's Internet-facing web application assets.
✑ A vulnerability in a third-party library was exploited by the hacker, resulting in the compromise of a local account.
✑ The hacker took advantage of the account's excessive privileges to access a data store and exfiltrate the data without detection.
Which of the following is the BEST solution to help prevent this type of attack from being successful in the future?
Mr_BuCk3th34D
Highly Voted 1 year, 6 months agohidady
1 year, 6 months agoMatty_B
1 year, 5 months agoSerliop378
1 year, 3 months agoAriel235788
8 months, 4 weeks agomansamusa
Most Recent 6 months, 3 weeks agoAriel235788
8 months, 4 weeks agoimather
11 months agoBiteSize
11 months, 2 weeks agodarkdumper
1 year, 2 months agoBreakOff874
1 year, 2 months agojosepa
1 year, 3 months agoFoxTrotDG
1 year, 3 months agoFOURDUE
1 year, 4 months agoFOURDUE
1 year, 4 months agohidady
1 year, 6 months ago