Question
A security analyst has received the following requirements for the implementation of Enterprise credential management software: - the software must have traceability back to an
A security analyst has received the following requirements for the implementation of Enterprise credential management software:
- the software must have traceability back to an individual
- credentials must remain unknown to the vendor at all times
- there must be forced credential changes upon ID check out
- complexity requirements must be enforced
- the software must be quickly and easily scalable with a minimum availability
which of the following vendor configurations would best meet these requirements?
-
Credentials encrypted in transit and then stored hashed and salted in a vendor Cloud where the vendor handles Key Management
-
Credentials stored hashed insulted on local machines
-
credentials encrypted in transit and stored in a vendor Cloud where the Enterprise retains the keys
-
credentials encrypted in transit and stored on an internal Network server with backups that are taken on a weekly basis
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started