An IoT engineer is responsible for security at an organization. Humans and machines need to be allowed to access services like database or compute on AWS. The engineer decides to implement dynamic secrets. Which method helps to get this implementation accurate from a security point of view?
A) Create a central secret system for humans and machine to obtain very short-lived dynamic secrets to access any service.
B) Humans cannot be trusted, and each time they authenticate they should be issued with dynamic secrets. Machines can be trusted, and they can be issued with static credentials.
C) Maintain a different service associated to secret systems to issue access.
D) After a user is authenticated by any trusted system, the user can be trusted to use any service.
Correct Answer:
Verified
Q1: Q2: A network is being configured for an Q3: An IoT application has been built into Q4: Which connector is southbound? Q6: The environment for an Industrial IoT project Q7: Which statement explains the correct position of Q8: Which two states are applications expected to
A) horizontal connector
B) cloud
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents