Considering the shared responsibility model, which of the following scenarios best demonstrates a consumer effectively fulfilling their security responsibilities?
A consumer relies solely on the CSP's physical security measures without implementing any data encryption or access controls.
A consumer focuses only on physical security measures and ignores the need for data encryption and access controls.
A consumer regularly audits their data access logs, implements encryption, and ensures strong access controls while trusting the CSP to manage physical security.
A consumer implements robust encryption and access control measures for their data but does not verify the physical security measures of the CSP.
A consumer relies solely on the CSP's physical security measures without implementing any data encryption or access controls.
A consumer focuses only on physical security measures and ignores the need for data encryption and access controls.
A consumer regularly audits their data access logs, implements encryption, and ensures strong access controls while trusting the CSP to manage physical security.
A consumer implements robust encryption and access control measures for their data but does not verify the physical security measures of the CSP.