A cloud service provider is concerned about an attacker gaining access to consumers confidential information by compromising the password database.
Which security mechanism should the cloud service provider deploy to mitigate the risk due to this attack?
Comments