An organization is integrating its on-premises data center with a public cloud provider to create a hybrid cloud. Before any production traffic is allowed to traverse the new site-to-site VPN, the security team performs a risk assessment. Which consideration should receive the highest priority at this stage?
Estimating the long-term operational cost of duplicated security tooling.
Aligning identity and access management role naming conventions across cloud and on-prem directories.
Protecting data in transit by enforcing encrypted, authenticated channels between the environments.
Measuring the additional network latency introduced by replication traffic.
The very first exposure created by a hybrid cloud rollout is the network path that connects the two environments. If that link is not protected with strong encryption and mutual authentication, any data that crosses it can be intercepted, altered, or replayed. Other concerns-such as aligning identity and access controls, tracking costs, or measuring latency-remain important but can be addressed only after the confidentiality and integrity of in-transit data are assured.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is encrypting data in transit crucial in a hybrid cloud setup?
Open an interactive chat with Bash
What is mutual authentication, and how does it work in securing a site-to-site VPN?
Open an interactive chat with Bash
What are the risks if data in transit is not encrypted in a hybrid cloud environment?