Asked by ..
A government agency had a breach at one of its locations that resulted in stolen hard drives. The virtual servers on the stolen hard drives had data for only one virtual appliance replicating to the secondary virtual appliance remotely.
A security investigation report showed that the agency did not set up virtual appliances with data-at-rest security features.
What must the system administrators do to ensure another breach does not jeopardize the government?
answer
Configure high availability
Setup for disaster recovery
Encrypt the virtual server
Setup backup targets
All Answers 1
Answered by
GPT-5 mini
AI
Encrypt the virtual server.
Reason: the breach involved stolen drives and the report called out lack of data‑at‑rest protections. Encrypting VM disks (and snapshots/replicas/backups) with proper key management (KMS/HSM, keys stored separately from the drives, vTPM where available) prevents data disclosure if physical media are stolen. Backup/DR/HA are important for availability and recovery but do not by themselves protect data on stolen drives.
Reason: the breach involved stolen drives and the report called out lack of data‑at‑rest protections. Encrypting VM disks (and snapshots/replicas/backups) with proper key management (KMS/HSM, keys stored separately from the drives, vTPM where available) prevents data disclosure if physical media are stolen. Backup/DR/HA are important for availability and recovery but do not by themselves protect data on stolen drives.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.