ISC2 Certified Cloud Security Professional (CCSP) Practice Question
Your organization plans to deploy a customer-facing microservice in its public cloud environment. The development team wants to base the container image on a third-party open-source image downloaded from a public registry. Before granting production approval, the cloud security professional must perform a vendor assessment focused on supply-chain risk. Which action offers the highest level of assurance that the image is free of undocumented or malicious components?
Review the vendor's marketing datasheet to confirm that they claim secure development practices.
Match the image's cryptographic digest to a signed SBOM entry and reproduce the build from the vetted source code in a controlled pipeline.
Approve the image if it has over one million downloads and a high user rating in the registry.
Pull the image, execute functional smoke tests in a sandbox, and promote it if the tests pass.
The most reliable way to detect hidden or malicious additions in a third-party container image is to verify that the binary exactly matches a signed, documented build that can be reproduced from vetted source code. Matching the image's cryptographic digest to the manifest contained in an authenticated software bill of materials (SBOM) confirms provenance, while performing a reproducible build in a controlled pipeline validates that no code has been inserted between source and artifact. Running functional tests or relying on popularity metrics provides far less assurance, and marketing literature offers virtually none.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic digest and how does it ensure security?
Open an interactive chat with Bash
What is a Software Bill of Materials (SBOM) and why is it important for supply chain security?
Open an interactive chat with Bash
What is a controlled pipeline, and how does it reproduce builds securely?
Open an interactive chat with Bash
What is a cryptographic digest and how does it ensure security?
Open an interactive chat with Bash
What is a software bill of materials (SBOM) and why is it critical for supply-chain security?
Open an interactive chat with Bash
What is a reproducible build and how does it validate the security of a container image?
Open an interactive chat with Bash
ISC2 Certified Cloud Security Professional (CCSP)
Cloud Application Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .