A company requires a method to precisely define and enforce who can access their proprietary database application, ensuring that only specific employees are able to retrieve or modify data. What is the BEST method to implement this requirement?
Place the database application on an isolated network segment.
Activate a frequent password reset schedule across the company.
Install the latest antivirus software on all devices within the organization.
Establish permissions which specify user access at a granular level.
The best method to enforce strict access to a database application would be to define permissions that explicitly list which individuals or roles are authorized to access or manipulate the data. This method allows the company to maintain an accurate ledger of who is granted which permissions and can be audited to hold users accountable for their interactions with the database. Rules can be fine-tuned at a granular level, providing the exact level of control necessary for sensitive applications such as those used for financial or proprietary data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are granular permissions?
Open an interactive chat with Bash
How do permissions and auditing work together?
Open an interactive chat with Bash
What is the significance of user roles in access control?