CISSP Practice Question – Domain 2: Asset Security (Data Lifecycle, Cloud, and Zero Trust)
A multinational enterprise migrates sensitive analytics workloads to a cloud provider. The environment uses a zero-trust architecture, and encryption is enabled for data in transit and at rest. During a review, the CISO learns that several teams are using cloud-native analytics tools that temporarily decrypt and process customer PII inside managed service environments where the organization has no visibility into memory, caching, or key-handling operations. Which control is MOST critical to implement to maintain data-lifecycle protection under these conditions? A. Enforce customer-managed encryption keys (CMEK) and prohibit provider-managed key usage. B. Implement strict data-minimization and tokenization before data enters the cloud analytics pipeline. C. Require all analytics tools to run only in containers where memory and cache can be fully inspected. D. Mandate continuous CASB monitoring to detect shadow analytics workflows and unauthorized data feeds.