An electronics manufacturer is selling a segment of its software division. Executives want to protect trade secrets during the transition. Which approach is most effective to safeguard critical data while keeping essential communications open?
Place sensitive files on an offline repository to reduce the risk of information leakage
Restrict remote connectivity during the ownership change process
Grant temporary read-level access for the departing group to review relevant documents
Enforce specific permissions so staff can access data clearly aligned with their roles
Limiting access based on role helps ensure individuals can reach the information they need, while protecting data not relevant to their responsibilities. Temporary read-level access across many documents can expose sensitive material. Placing critical files on an offline system might cut off necessary collaboration. Restricting remote activities throughout the transition can halt operations that should continue, creating workflow bottlenecks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is enforcing role-based permissions considered the most effective method?
Open an interactive chat with Bash
What is the 'least privilege' principle in access control?
Open an interactive chat with Bash
Why wouldn’t placing sensitive files offline be a good idea during this transition?