ISC2 Certified Cloud Security Professional (CCSP) Practice Question
During a security review of a cloud-native SaaS application, you discover that outdated open-source libraries are still being introduced into production even though static (SAST) and dynamic (DAST) code scans already run in the CI/CD pipeline. To comply with corporate policy that mandates using only verified secure software, which additional control should the security team integrate into the build process to MOST effectively detect and block vulnerable third-party components before deployment?
Deploy a web application firewall in front of the SaaS platform to filter OWASP Top-10 attacks at runtime.
Require all developers to cryptographically sign their Git commits with personal SSH keys.
Enable multi-factor authentication on the container registry used by the pipeline.
Integrate Software Composition Analysis (SCA) to automatically inventory dependencies and block builds that include components with known vulnerabilities or unacceptable licenses.
Software Composition Analysis (SCA) tools catalogue every third-party and open-source component in a build, compare component versions against vulnerability and license databases, and fail the pipeline when known problems are detected. This directly addresses the risk of unverified or vulnerable dependencies entering production, fulfilling the requirement to use only verified secure software.
Signing commits with SSH keys and enforcing MFA help with developer authentication and repository access control but do not inspect component security. A web application firewall provides runtime protection but does not stop vulnerable libraries from being built into images in the first place.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Software Composition Analysis (SCA)?
Open an interactive chat with Bash
How does SCA differ from static (SAST) and dynamic (DAST) code scanning?
Open an interactive chat with Bash
What is the role of CI/CD pipelines in integrating SCA tools effectively?
Open an interactive chat with Bash
ISC2 Certified Cloud Security Professional (CCSP)
Cloud Application Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .