A cloud engineer is preparing to roll out several virtual instances for a department handling highly confidential data. The organization has specific compliance requirements that dictate a stringent security configuration. The engineer must choose a deployment method that ensures each virtual instance will be consistent with the latest organizational security directives. Which method should the engineer employ?
You selected this option
Deploy instances from a hardened golden image crafted to reflect up-to-date organizational security baselines at the time of instance creation.
You selected this option
Execute a standard operating system installation followed by an automated security configuration script that was last reviewed six months ago.
You selected this option
Duplicate the configuration of an existing, secure environment without reviewing recent security advisories and baseline updates.
You selected this option
Utilize a template from the organization's image repository without verifying when it was last updated with the latest security standards.
Leveraging a hardened golden image ensures that the latest organizational security configurations and patches are included in every new instance, providing assurance that each one meets the strict compliance requirements from the moment they start running. The incorrect options present plausible alternatives but fall short of the adherence to up-to-date security configurations assured by a hardened golden image. A new installation may not include the latest custom security configurations, a template from an image repository might not be synchronized with the most recent security updates, and while a replicated environment implies consistency, it does not guarantee the latest security standards are met.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hardened golden image, and why is it important?
Open an interactive chat with Bash
What are compliance requirements in a cloud environment?
Open an interactive chat with Bash
What are some common security configurations included in a hardened image?