A sensor company works with an outside group that provides critical firmware updates. The security lead notices that the outside group’s privileged connections unexpectedly include systems beyond what was initially defined. Which action is most effective for reducing harm if that outside group’s login credentials are compromised?
Revise contract details to include penalties for mishandling credentials
Monitor existing usage patterns but avoid network segmentation
Enable a segregated network path for the external group’s tasks
Create large-scale access policies depending on management’s instructions
Controlling how external accounts interact with internal systems is vital for safeguarding critical data. Enabling specific zones for each account restricts broader infiltration attempts and isolates any hostile activity. Monitoring procedures and contract safeguards help, but they do not contain unauthorized activity in real time. Relying on labels or instructions from leadership alone overlooks architectural defenses, which are needed immediately when an intrusion occurs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a segregated network path?
Open an interactive chat with Bash
Why is network segmentation more effective than monitoring alone?
Open an interactive chat with Bash
How does isolating external accounts enhance security?