Notifications
Clear all
Topic starter
A company hired a third party to develop software as part of its strategy to be quicker to market.
The company’s policy outlines the following requirements:
The credentials used to publish production software to the container registry should be stored in a secure location.
Access should be restricted to the pipeline service account, without the ability for the third-party developer to read the credentials directly.
Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials?
- A . TPM
B. Local secure password file
C. MFA
D. Key vault
Suggested Answer: D
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/tpm-fundamentals
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/tpm-fundamentals
Posted : 12/01/2023 3:36 am