ISC2 Certified Cloud Security Professional (CCSP) Practice Question
During a secure DevOps review for a cloud-native application, you discover that the CI/CD pipeline downloads base container images and open-source libraries directly from public repositories at build time. The CISO requires the team to "use verified secure software." Which control will provide the MOST direct assurance that a malicious or tampered component cannot be introduced during the build process?
Enable seccomp and AppArmor profiles on all production containers to restrict system calls at runtime.
Deploy a cloud-based web application firewall (WAF) in front of the microservice APIs.
Mandate that developers run a static application security testing (SAST) scan on source code before each commit is merged.
Implement repository allow-listing and enforce cryptographic signature verification (for example, Cosign or Notary v2) for every image and package fetched during the build.
Requiring that every external component be cryptographically signed and that the build system verify those signatures (for example, with Cosign or Notary v2) ensures the provenance and integrity of each image or package before it is added to an artifact. This directly addresses supply-chain risks by blocking unsigned or altered content. Enabling runtime hardening tools such as seccomp/AppArmor improves container confinement but does not validate the software's origin. Static application security testing scans source code written by developers, not third-party binaries pulled at build time. A web application firewall mitigates inbound attacks against the running service, not the risk of poisoned build inputs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is cryptographic signature verification, and how does it ensure security in software supply chains?
Open an interactive chat with Bash
What role do tools like Cosign and Notary v2 play in secure DevOps practices?
Open an interactive chat with Bash
Why is repository allow-listing needed alongside signature verification?
Open an interactive chat with Bash
Can you explain what cryptographic signature verification is?
Open an interactive chat with Bash
What risks are associated with public repositories in a CI/CD pipeline?
Open an interactive chat with Bash
How do Cosign and Notary v2 enhance supply-chain security in DevOps?
Open an interactive chat with Bash
ISC2 Certified Cloud Security Professional (CCSP)
Cloud Application Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .