Which of the following is the BEST approach to optimize data security in an IaaS migration of data to the cloud?
A. Review the risk register.
B. Perform a vulnerability scan
C. Perform server hardening.
D. Configure encryption in transit.
A. Review the risk register.
B. Perform a vulnerability scan
C. Perform server hardening.
D. Configure encryption in transit.