An organization's web server configuration has been altered without authorization, leading to a security breach. The security team decides to implement a system that tracks all changes to the configuration files, maintains a history of these changes, and allows them to revert to any previous version if necessary. Which of the following solutions will BEST meet these requirements?
Use file integrity monitoring tools on configuration files
Apply strict access controls to configuration files
Implement a version control system for configuration files
Implementing a version control system allows the organization to track every change made to configuration files, maintain a history of modifications, and revert to any previous version when needed. This meets all the requirements stated. Regular backups (Option B) allow restoration of files but may not provide detailed change tracking or the ability to view the history of changes. Strict access controls (Option C) can prevent unauthorized access but do not track changes made by authorized users. File integrity monitoring (Option D) can detect changes but doesn't provide version history or the ability to revert changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a version control system?
Open an interactive chat with Bash
How does a version control system differ from backups?
Open an interactive chat with Bash
What are the benefits of file integrity monitoring tools?