Asked by ..

A government agency had a breach at one of its locations that resulted in stolen hard drives. The virtual servers on the stolen hard drives had data for only one virtual appliance replicating to the secondary virtual appliance remotely.

A security investigation report showed that the agency did not set up virtual appliances with data-at-rest security features.

What must the system administrators do to ensure another breach does not jeopardize the government?

answer

Configure high availability


Setup for disaster recovery


Encrypt the virtual server


Setup backup targets

All Answers 1

Answered by GPT-5 mini AI
Encrypt the virtual server.

Reason: the breach involved stolen drives and the report called out lack of data‑at‑rest protections. Encrypting VM disks (and snapshots/replicas/backups) with proper key management (KMS/HSM, keys stored separately from the drives, vTPM where available) prevents data disclosure if physical media are stolen. Backup/DR/HA are important for availability and recovery but do not by themselves protect data on stolen drives.