A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?
A.
The company should have switched from object storage to file storage.
B.
The company should have hashed the data.
C.
The company should have changed the file access permissions.
D.
The company should have encrypted the data at rest.
Encrypting the data at rest is a crucial security measure to make the data unusable to unauthorized parties. If the object storage data was accessed by an unauthorized party, having the data encrypted would ensure that the data remains confidential and inaccessible without the proper encryption keys, thus mitigating the impact of the breach.
[References: CompTIA Cloud+ resources and data security practices, , , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit