Question: A security analyst just discovered that developers have access to production systems that are used for deployment and troubleshooting. One developer, who recently left company,
A security analyst just discovered that developers have access to production systems that are used for deployment and troubleshooting. One developer, who recently left company, abused this access to obtain sensitive information. Which of the following is the BEST account management strategy to prevent this from reoccurring?
- Perform an account review and ensure least privilege is being followed for production access
- Implement multifactor authentication for accessing production systems
- Configure jump boxes and prevent access to production from any other system
- Set up time-of-day restrictions that prevent access to production systems during business hours
- Modify the AUP to prohibit developers from accessing production systems
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
