ISC2 CISSP Practice Question

A financial services company is transitioning to a DevSecOps model to accelerate its software delivery. The Chief Information Security Officer (CISO) is concerned about introducing new risks and has been asked to recommend the single most effective strategy for securing the new CI/CD pipeline from end to end. The goal is to catch vulnerabilities as early as possible without impeding development velocity. Which of the following approaches BEST meets the CISO's objective?

  • Enforcing code signing with hardware security modules before artifact deployment

  • Isolating the build environment with ephemeral VMs

  • Automated security testing integrated at multiple stages of the pipeline

  • Implementing container image scanning and storing results in a tamper-evident database

ISC2 CISSP
Software Development Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot