During a routine security audit, administrators discover that cloud storage backups were illegally accessed and modified. Which countermeasure would most directly mitigate such incidents in the future?
The Certified Ethical Hacker (CEH) Cloud Computing and Data Protection module emphasizes the importance of resilient backup strategies to protect against data tampering, ransomware, and unauthorized modification.
The 3-2-1 backup model is a widely recommended best practice referenced in CEH materials. It requires maintaining:
3 copies of data
Stored on 2 different media types
With 1 copy stored offsite
This approach ensures that even if cloud backups are compromised or altered, clean and uncompromised versions remain available. CEH documentation highlights this model as a core defense against data integrity attacks in cloud environments.
Option D directly mitigates the risk of backup tampering.
Options A, B, and C address unrelated security concerns and do not protect backup integrity.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit