Assessment test answers
- B. Use a centralized trusted secrets manager service. Secrets can include user or auto-generated passwords, APIs, and other application keys/credentials, SSH keys, databases, and other system-to-system passwords. You should use private certificates for secure communication and private encryption keys.
External reference: https://www.beyondtrust.com/resources/glossary/secrets-management.
See Chapter 4, Deploying Enterprise Authentication and Authorization Controls, for more details on secure account management concepts.
- B. Privacy Impact Assessment. A PIA should be undertaken by any organization that stores, transmits, or processes data that contains private information. Data types will vary but can include documents, database records, and media such as CCTV footage and voice recordings. See Chapter 15, Business Continuity and Disaster Recovery Concepts.
- C. Separation of duties. When an employee has privileges that enable them to make...