A cloud administrator configures a server to insert an entry into a log file whenever an administrator logs in to the server remotely.
Which of the following BEST describes the type of policy being used?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
The type of policy being used in the given scenario is the "Audit" policy.
An audit policy is a set of rules or guidelines that govern how logging and auditing information are captured, managed, and analyzed. It helps organizations comply with regulations, identify and respond to security breaches, and improve overall security posture.
In the given scenario, the server has been configured to insert an entry into a log file whenever an administrator logs in to the server remotely. This means that any remote login attempts by an administrator will be recorded in the log file, which can be reviewed later for security and compliance purposes. This type of logging is an example of an audit policy that tracks and records user activity for the purpose of security and compliance.
Authorization policies control who is allowed to access resources, and what level of access they are granted. Hardening policies refer to the process of securing a system by reducing its surface area of attack, disabling unnecessary services and features, and implementing other security best practices. Access policies are a set of rules that dictate how users can access resources and what actions they can perform once they have access.
Therefore, none of the other policy types mentioned in the answer choices - Authorization, Hardening, and Access - apply to the given scenario as they do not involve logging and auditing user activity.