Question 1 of 30
A company has recently implemented a new user profile management system to enhance security and streamline user access to resources. The system allows for the creation of user profiles that include various attributes such as user roles, permissions, and group memberships. During a security audit, it was discovered that a user profile was incorrectly configured, granting access to sensitive data that should have been restricted. What is the most effective approach to rectify this issue while ensuring compliance with security policies and maintaining user productivity?
Review and adjust the user profile settings to align with the least privilege principle, ensuring that the user only has access to the resources necessary for their role.
Delete the user profile entirely and create a new one from scratch to eliminate any potential misconfigurations.
Temporarily suspend the user’s account until a full investigation can be conducted, which may disrupt their workflow.
Increase the user’s permissions to allow access to additional resources while the audit is ongoing, to facilitate their work.