An organization's internal department frequently uses a cloud provider to store large amounts of sensitive data.
A threat actor has deployed a virtual machine to attack another virtual machine to gain access to the data.
Through the use of the cloud host's hypervisor, the threat actor has escalated the access rights. Which of the following actions would be BEST to remediate the vulnerability the attacker has used to exploit the system?
A. Sandbox the virtual machine.
B. Implement an MFA solution.
C. Update to the secure hypervisor version.
D. Implement dedicated hardware for each customer.
A threat actor has deployed a virtual machine to attack another virtual machine to gain access to the data.
Through the use of the cloud host's hypervisor, the threat actor has escalated the access rights. Which of the following actions would be BEST to remediate the vulnerability the attacker has used to exploit the system?
A. Sandbox the virtual machine.
B. Implement an MFA solution.
C. Update to the secure hypervisor version.
D. Implement dedicated hardware for each customer.