Table of Contents
Security architecture vs operational checks: what belongs and what doesn’t
Learn why “periodic evaluation of permissions” is not included in Security Architecture design and how data sensitivity, workload isolation, shared‑security model, and risk assessment are core architecture steps.
Question
Which step is NOT included in Security Architecture?
A. Data sensitivity and compliance concerns
B. Periodic evaluation of permissions
C. Workload isolation
D. Understanding shared security model for cloud provider
E. Risk assessment, prioritization, and scoring
Answer
B. Periodic evaluation of permissions
Explanation
In the Security Architecture context, the core steps are about defining how security is designed and structured for the cloud environment, not about ongoing operational checks. The included steps are:
- Data sensitivity and compliance concerns (A) – classifying data and aligning with regulatory requirements.
- Workload isolation (C) – separating workloads to reduce blast radius and lateral movement.
- Understanding shared security model for cloud provider (D) – clarifying what the cloud provider versus the customer is responsible for.
- Risk assessment, prioritization, and scoring (E) – evaluating threats and ranking them to guide controls.
“Periodic evaluation of permissions” (B) is an operational or governance activity done after the architecture is in place; it is not a primary design‑phase step of security architecture itself.
Oracle Cloud Infrastructure Cloud Adoption Framework and Essentials certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the OCI CAF graded quizzes and final assessments, earn OCI CAF digital credential and badge.