A product team shifts several confidential files to a new cloud environment. Later, a developer notices that some of these files were viewed by staff members lacking the right credentials. Which measure helps reduce risk without disrupting legitimate collaboration?
Require detailed logging by the development team for every file interaction
Establish ephemeral instances to refresh the system at frequent intervals
Replace the entire system with a container-based deployment for file management
Implement tagging to align file sensitivity levels with access privileges
Tagging and classification requirements match files to user roles. This approach limits who can view or interact with sensitive data, reducing accidental sharing. Making the environment ephemeral or switching to another technology does not fix permission gaps. Generating more logs allows audits but does not prevent exposure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is file sensitivity tagging?
Open an interactive chat with Bash
How does tagging differ from logging?
Open an interactive chat with Bash
What are the benefits of tagging over switching technologies like containers?