ISC2 CISSP Practice Question

A software development team is transitioning to a container-based workflow using Docker and Kubernetes. As part of a new DevSecOps initiative, the Chief Information Security Officer (CISO) has asked the lead security architect to prioritize the implementation of a foundational security control within the CI/CD pipeline to minimize the risk of deploying vulnerable applications. Which of the following controls would BEST meet this requirement as the most impactful first step?

  • Implementing Mandatory Access Control on the container hosts

  • Deploying runtime container behavioral monitoring with anomaly detection

  • Scanning container images for vulnerabilities and misconfigurations

  • Enforcing cryptographic verification of container image integrity and provenance

ISC2 CISSP
Software Development Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot