Q: 7
Your company is moving its critical business applications to a public cloud platform. As part of the security design, you need to implement controls that ensure only authorized personnel can access sensitive resources within the cloud environment. Which of the following approaches is most effective for ensuring that users are properly authorized to access sensitive resources in the cloud?
Options
Discussion
Option C
C . Allowing users to self-assign (A) is the classic trap here, seen it pop up a lot on practice sets.
C is the way to go here. Official study guides and most sample tests hammer RBAC as the best approach for mapping access to user roles in cloud. It ties right into least privilege and auditability, so I'm pretty sure this is what exam wants. Agree or any other sources say different?
C is what I'd pick too. Practice exams and the official guide both really stress RBAC for this scenario.
D . If all admins share a single account, they all have the same access and there's no risk of assigning the wrong permissions to just one person accidentally. It saves time since you don't manage individual credentials. I think it covers authorization, but not totally sure if I'm missing an obvious risk here. Agree?
C tbh. Had a super similar question in a mock and RBAC was the right move since it enforces least privilege and maps access to job roles. Letting users self-assign or using shared accounts is a security nightmare. Anyone see it done differently on their exam?
C
C, not A. Self-assigning permissions (A) is risky and usually a trap on these questions. RBAC in C controls access based on roles, which is best for authorization in cloud setups imo. Anyone disagree?
Option C
Be respectful. No spam.