A cloud administrator is tasked with the maintenance and security of cloud service configurations. Which of the following would be the MOST effective method to ensure that system configurations are not altered without authorization?
Implementing a configuration management database (CMDB) with real-time change alerts
Performing routine audits with an external third-party assessor
Utilizing secure Jump Boxes for all system configuration changes to servers
Conducting periodic reviews of system configurations by an audit team
Configuration management databases (CMDBs) are designed to hold information relating to all the components of an information system and provide a means to track configuration changes. This centralized repository allows organizations to monitor and control system changes, ensuring that all alterations are recorded and authorized. Auditing allows you to retrospectively analyze changes, but real-time alerts from a CMDB give you the ability to proactively respond to unauthorized changes. Periodic reviews are important, but they are not as effective as a CMDB for prevention. Using Jump Boxes, while valuable for secure management, does not directly help in tracking configuration changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Configuration Management Database (CMDB)?
Open an interactive chat with Bash
What are real-time change alerts in a CMDB?
Open an interactive chat with Bash
Why is proactive monitoring more effective than periodic audits?