A system architect has the following constraints from the customer:
– Confidentiality, Integrity, and Availability (CIA) are all of equal importance.
– Average availability must be at least 6 nines (99.9999%).
– All devices must support collaboration with every other user device.
– All devices must be VoIP and teleconference ready.
Which of the following security controls is the BEST to apply to this architecture?
A . Deployment of multiple standard images based on individual hardware configurations, employee choice of hardware and software requirements, triple redundancy of all processing equipment.
B . Enforcement of strict network access controls and bandwidth minimization techniques, a single standard software image, high speed processing, and distributed backups of all equipment in the datacenter.
C . Deployment of a unified VDI across all devices, SSD RAID in all servers, multiple identical hot sites, granting administrative rights to all users, backup of system critical data.
D . Enforcement of security policies on mobile/remote devices, standard images and device hardware configurations, multiple layers of redundancy, and backup on all storage devices.
Leave a Reply