A product team shifts several confidential files to a new cloud environment. Later, a developer notices that some of these files were viewed by staff members lacking the right credentials. Which measure helps reduce risk without disrupting legitimate collaboration?
Implement tagging to align file sensitivity levels with access privileges
Establish ephemeral instances to refresh the system at frequent intervals
Replace the entire system with a container-based deployment for file management
Require detailed logging by the development team for every file interaction
Tagging and classification requirements match files to user roles. This approach limits who can view or interact with sensitive data, reducing accidental sharing. Making the environment ephemeral or switching to another technology does not fix permission gaps. Generating more logs allows audits but does not prevent exposure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'tagging' mean in the context of file sensitivity and access control?
Open an interactive chat with Bash
How do tagging and classification systems reduce the risk of data exposure?
Open an interactive chat with Bash
What is the difference between tagging and detailed logging in preventing unauthorized file access?