Encryption in object storage is used to secure stored data and protect it from unauthorized access, ensuring confidentiality. Reference: [Security Guidance v5, Domain 9 - Data Security]
Questions 5
What is the primary reason dynamic and expansive cloud environments require agile security approaches?
Options:
A.
To reduce costs associated with physical hardware
B.
To simplify the deployment of virtual machines
C.
To quickly respond to evolving threats and changing infrastructure
Serverless computing shifts infrastructure management responsibility to the CSP, allowing customers to focus on application logic rather than infrastructure. Reference: [Security Guidance v5, Domain 8 - Cloud Workload Security]
Questions 7
How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?
Fine-grained permissions enable specific control over who can access certain resources, thus enforcing the least privilege principle. Reference: [Security Guidance v5, Domain 5 - IAM]