A software development team is transitioning to a container-based workflow using Docker and Kubernetes. As part of a new DevSecOps initiative, the Chief Information Security Officer (CISO) has asked the lead security architect to prioritize the implementation of a foundational security control within the CI/CD pipeline to minimize the risk of deploying vulnerable applications. Which of the following controls would BEST meet this requirement as the most impactful first step?
Implementing Mandatory Access Control on the container hosts
Deploying runtime container behavioral monitoring with anomaly detection
Scanning container images for vulnerabilities and misconfigurations
Enforcing cryptographic verification of container image integrity and provenance
The correct answer is scanning container images for vulnerabilities and misconfigurations. Container images often include operating system components, libraries, and application dependencies that may contain security vulnerabilities. Regular scanning as part of the CI/CD pipeline is a foundational 'shift-left' security practice that helps identify and remediate these issues before containers are deployed to production.
Implementing Mandatory Access Control restricts what processes running inside containers can do but is typically more complex to implement and maintain in fast-paced development environments. It is better suited for hardening production systems.
Deploying runtime container behavioral monitoring with anomaly detection is a sophisticated security measure that helps detect suspicious activities during container execution. However, this is a detective control rather than a preventive one and is more appropriate for production environments where understanding active threats is critical.
Enforcing cryptographic verification of container image integrity and provenance ensures containers haven't been tampered with and come from trusted sources. While important for supply chain security, this control verifies the authenticity of containers rather than identifying inherent vulnerabilities or misconfigurations that might exist in properly signed container images.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is scanning container images for vulnerabilities important in development environments?
Open an interactive chat with Bash
What tools are commonly used to scan container images for vulnerabilities?
Open an interactive chat with Bash
What is the difference between preventive and detective controls in container security?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .