Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
A . The process of specifying and maintaining access policies
B. Checking data storage to make sure it meets compliance requirements
C. Giving a third party vendor permission to work on your cloud solution
D. Establishing/asserting the identity to the application
E. Enforcing the rules by which access is granted to the resources
Answer: D
Latest CCSK Dumps Valid Version with 60 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund