You are using CrowdStrike's Cloud Infrastructure Entitlement Manager (CIEM) to manage access policies in your organization. You want to assign a policy that restricts access to a specific cloud storage service only to users in the "Finance" group.
What steps must you take to ensure this policy is correctly assigned and enforced?
A. Configure the policy in the cloud provider's IAM service and then synchronize it with CIE
B. Use CIEM to deactivate all policies for other groups, leaving only the "Finance" group with permissions.
C. Define a policy in CIEM targeting the "Finance" group and map it to the relevant roles and permissions for the cloud storage service.
D. Assign the policy at the cloud provider level and ensure it applies to all roles, overriding specific user permissions.
Explanation:
Option A: Configuring policies directly in the cloud provider's IAM service bypasses CIEM's centralized management capabilities, reducing visibility and control over entitlements. Synchronization with CIEM is typically used for monitoring, not primary configuration.
Option B: Deactivating all other policies is not a scalable or secure approach. It can inadvertently disrupt other users' workflows and does not utilize CIEM's ability to manage entitlements effectively.
Option C: CIEM enables you to define and assign policies targeting specific groups, such as "Finance," and map them to roles and permissions for services like cloud storage. This approach ensures policies are aligned with organizational requirements and avoids over-provisioning.
Option D: While assigning policies at the cloud provider level is possible, it is not the recommended approach when using CIEM. CIEM provides granular control, allowing you to manage permissions based on groups or roles rather than applying blanket policies.