CompTIA Cloud+ CV0-003 Practice Question
An organization is deploying a new application in their cloud environment. The security team needs to ensure that only traffic from authorized sources can access this application. Which of the following is the BEST approach to meet this requirement?
Implement an allow list for the application based on source IP addresses and domains
Monitor network flows to identify and block unauthorized traffic towards the application
Place the application on a blocklist that specifies disallowed source IP addresses and domains
Use micro-segmentation to isolate the application from other workloads in the cloud