A new manager is configuring a shared place for sensitive logs. Unwanted access to these logs has been detected. Which approach helps prevent unauthorized reading and editing of these files?
Designate a single user account with global privileges to monitor any changes that occur
Use role-based rules and encrypt the data used for storage to protect the logs from unintended readers and editors
Switch to a group chat application and embed the logs for quick review by all participants
Store all logs on a public server so everyone with a link can review them
Controlling permissions through assigned groups and using encryption at rest limits who can open or change the files, and it helps shield them from unwanted review if the storage is accessed by unauthorized individuals. Approaches that allow open access or omit encryption can lead to unapproved users viewing or altering the data, compromising confidentiality and integrity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are role-based rules, and how do they help with file security?
Open an interactive chat with Bash
What does 'encryption at rest' mean, and how does it protect data?
Open an interactive chat with Bash
How does unauthorized access compromise the confidentiality and integrity of sensitive logs?