While performing mandatory monthly patch updates on a production application server, the security analyst reports an instance of buffer overflow for a new application that was migrated to the cloud and is also publicly exposed. Security policy requires that only internal users have access to the application.
Which of the following should the analyst implement to mitigate the issues reported? (Choose two.)
- Configure firewall rules to block all external traffic.
- Enable input validation for all fields.
- Enable automatic updates to be installed on all servers.
- Configure the security group to enable external traffic.
- Set up a DLP policy to alert for exfiltration on all application servers.
- Enable nightly vulnerability scans.
Answer(s): A,B
Explanation:
Configure firewall rules to block all external traffic: Since the security policy requires that only internal users have access to the application, configuring firewall rules to block all external traffic ensures that the application is not exposed to unauthorized users on the internet. This mitigates unauthorized access risks.
Enable input validation for all fields: Buffer overflows often exploit improper or lack of input validation. Enabling strict input validation ensures that only properly formatted data is accepted, preventing malicious input designed to exploit vulnerabilities in the application.
Reveal Solution
Next Question