What should you use to implement the security policy?

Posted by: Pdfprep Category: AZ-304 Tags: , ,

You have 200 resource groups across 20 Azure subscriptions.

Your company’s security policy states that the security administrator must verify all assignments of the Owner role for the subscriptions and resource groups once a month. All assignments that are not approved by the security administrator must be removed automatically. The security administrator must be prompted every month to perform the verification.

What should you use to implement the security policy?
A . Access reviews in Identity Governance
B . role assignments in Azure Active Directory (Azure AD) Privileged identity Management (PIM)
C . Identity Secure Score in Azure Security Center
D . the user risk policy W» Azure Active Directory (Azure AD) Identity Protection

Answer: A

Leave a Reply

Your email address will not be published.