Explanation: An audit policy is a set of rules and guidelines that define how to monitor and record the activities and events that occur on a system or network1. An audit policy can help track and report the actions of users, applications, processes, or devices, and provide evidence of compliance, security, or performance issues. An audit policy can also help deter unauthorized or malicious activities, as the users know that their actions are being logged and reviewed.
A cloud administrator who configures a server to insert an entry into a log file whenever an administrator logs in to the server remotely is using an audit policy, as they are enabling the collection and recording of a specific event that relates to the access and management of the server. The log file can then be used to verify the identity, time, and frequency of the administrator logins, and to detect any anomalies or suspicious activities.
An authorization policy is a set of rules and guidelines that define what actions or resources a user or a system can access or perform2. An authorization policy can help enforce the principle of least privilege, which means that users or systems are only granted the minimum level of access or permissions they need to perform their tasks. An authorization policy can also help prevent unauthorized or malicious activities, as the users or systems are restricted from accessing or performing actions that are not allowed or necessary.
A hardening policy is a set of rules and guidelines that define how to reduce the attack surface and vulnerability of a system or network3. A hardening policy can help improve the security and resilience of a system or network, by applying various measures such as disabling unnecessary services, removing default accounts, applying patches and updates, configuring firewalls and antivirus software, etc. A hardening policy can also help prevent unauthorized or malicious activities, as the users or systems are faced with more obstacles and challenges to compromise the system or network.
An access policy is a set of rules and guidelines that define who or what can access a system or network, and under what conditions or circumstances4. An access policy can help control the authentication and identification of users or systems, and the verification and validation of their credentials. An access policy can also help prevent unauthorized or malicious activities, as the users or systems are required to prove their identity and legitimacy before accessing the system or network. References: CompTIA Cloud Essentials+ CLO-002 Study Guide, Chapter 6: Cloud Service Management, pages 229-230.