A security analyst receives an email from a peer that includes a sample of code from a piece of malware found in an application running in the organization's staging environment. During the incident response process, it is determined the code was introduced into the environment as a result of a compromised laptop being used to harvest credentials and access the organization's code repository. While the laptop itself was not used to access the code repository, an attacker was able to leverage the harvested credentials from another system in the development environment to bypass the ACLs limiting access to the repositories. Which of the following controls MOST likely would have interrupted the kill chain in this attack?
A) IP whitelisting on the perimeter firewall
B) MFA for developer access
C) Dynamic analysis scans in the production environment
D) Blue team engagement in peer-review activities
E) Time-based restrictions on developer access to code repositories
Correct Answer:
Verified
Q379: A smart switch has the ability to
Q380: A company has made it a spending
Q381: Several days after deploying an MDM for
Q382: A secure facility has a server room
Q383: A security engineer discovers a PC may
Q385: A security administrator receives reports that several
Q386: A Chief Information Security Officer (CISO) has
Q387: A SaaS provider decides to offer data
Q388: The Chief Financial Officer (CFO) of an
Q389: The results of an external penetration test
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents