Storing sensitive keys in a specialized password manager and applying restricted privileges minimize unauthorized use while rotating the keys on a regular schedule helps remove old configurations that may be leaked. The other options either neglect the underlying vulnerability or introduce new risks. Encryption in transit alone does not protect keys at rest. Disabling logs can conceal incidents. Multi-factor authentication may be useful, but not when ignoring the broad-scope nature of the existing keys.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a password manager and how does it enhance security?
Open an interactive chat with Bash
Why is key rotation important in cybersecurity?
Open an interactive chat with Bash
What are 'minimal privileges,' and why are they important for managing sensitive keys?