Various network outages have occurred recently due to unapproved changes to network and security devices.
All changes were made using various system credentials. The security analyst has been tasked to update the
security policy. Which of the following risk mitigation strategies would also need to be implemented to reduce
the number of network outages due to unauthorized changes?
User rights and permissions review
Implement security controls on Layer 3 devices
Reviewing user rights and permissions can be used to determine that all groups, users, and other accounts
have the appropriate privileges assigned according to the policies of the corporation and their job descriptions.
Also, reviewing user rights and permissions will afford the security analyst the opportunity to put the principle of
least privilege in practice as well as update the security policy