Q: 1
Aidan McGraw is a cloud security engineer in a multinational company. In 2018, his organization
deployed its workloads and data in a cloud environment. Aidan was given the responsibility of
securing high-valued information that needs to be shared outside the organization from
unauthorized intruders and hackers. He would like to protect sensitive information about his
organization, which will be shared outside the organization, from attackers by encrypting the data
and including user permissions inside the file containing this information. Which technology satisfies
Aidan's requirements?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.