In: Computer Science
A company is migrating systems from an on-premises facility to a third-party managed datacenter. For continuity of operations and business agility, remote access to all hardware platforms must be available at all times. Access controls need to be very robust and provide an audit trail.
Which of the following security controls will meet the company’s objectives? (Select two.)
A. Integrated platform management interfaces are configured to allow access only via SSH
B. Access to hardware platforms is restricted to the systems administrator’s IP address
C. Access is captured in event logs that include source address, time stamp, and outcome
D. The IP addresses of server management interfaces are located within the company’s extranet
E. Access is limited to interactive logins on the VDi
F. Application logs are hashed cryptographically and sent to the SIEM
D. The IP addresses of server management interfaces are
located within the company’s extranet
Explanation:- The option is preferred as the IP addresses for the
server management interfaces are within extranet where firewall
rules/security rules , would keep all details masked and within
extranet . This would be accessed by authenticated business users
outside organization as per access control. It will not be
completely available on internet so robustness is achieved. The
main reason behind keeping all these IP addresses within extranet
is your customized security layers would be applied to enhance
security achieving security goal to make it robust but along with
it as a part of continuity process for business and operations
where some users would be outside the organizations also need
access to the company resources.
C. Access is captured in event logs that include source
address, time stamp, and outcome
Explanation:- Capturing logs related to all kind of access to the
assets needs to be captured and thoroughly monitored to restrict
unauthorized access to the organization. Access to the resources
should be restricted and also server access controls should be
audited in order to remediate unwanted access. All the
NTFS shares also to restrict as per standard access control policy.
Non-authenticated access should be strictly blocked/revoked if
found any vulnerability. Various security scanning tools can be
used to scan and revoke/block Non-authenticated access.