A system administrator has been notified that an audit has found certain files containing proprietary source code to be accessible by all employees through a shared network drive. The source code should only be accessible to members of the development team. To align with best practices for permissions management, which of the following actions should the system administrator implement FIRST to remediate this issue?
Set up an alert system to monitor file access patterns and flag any unauthorized attempts
Modify the permissions on the files to restrict access solely to the development team
Initiate a company-wide training on the importance of data confidentiality
Disable the shared network drive until a full user account review can be performed
The first and most effective action to address the issue is to modify the permissions on the files to ensure that only the development team has access. This alteration directly addresses the problem identified during the audit by enforcing proper access controls, thereby preventing unauthorized access to sensitive information. Disabling the shared network drive would remove access for the authorized development team and is not a precise method of access control. Performing a user account review may surface additional issues but will not rectify the immediate concern of unauthorized access to the proprietary source code. Monitoring the file access patterns is a reactive approach and would not prevent further unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are permissions management best practices?
Open an interactive chat with Bash
What is the principle of least privilege?
Open an interactive chat with Bash
What are the risks of leaving proprietary source code exposed to all employees?