This is a dedicated watch page for a single video.
A cloud security team is reviewing remote access policies for managing cloud-based virtual machines. To enhance security, they decide to implement a solution that provides a secure gateway for administrators accessing resources in a private subnet while enforcing multi-factor authentication and logging all access attempts. Which of the following BEST meets these requirements?