A company runs large computing jobs only during the overnight hours. To minimize the amount of
capital investment in equipment, the company relies on the elastic computing services of a major
cloud computing vendor. Because the virtual resources are created and destroyed on the fly
across a large pool of shared resources, the company never knows which specific hardware
platforms will be used from night to night. Which of the following presents the MOST risk to
confidentiality in this scenario?
A.
Loss of physical control of the servers
B.
Distribution of the job to multiple data centers
C.
Network transmission of cryptographic keys
D.
Data scraped from the hardware platforms