Practice Question
Gary was recently hired as the first chief information security officer (CISO) for a local government agency. The agency recently suffered a security breach and is attempting to build a new information security program. Gary would like to apply some best practices for security operations as he is designing this program. Gary is preparing to develop controls around access to root encryption keys and would like to apply a principle of security designed specifically for very sensitive operations. Which principle should he apply?
Least privilege
Defense in depth
Security through obscurity
Two-person control
17 votes
1
7 comments
Nexar Donadio
3
Practice Question
CISSP Study Group
Public group
Join our CISSP study group for cybersecurity professionals! Share resources, get advice, and connect with peers studying for the CISSP exam today.
Leaderboard (30-day)
powered by