ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
During a security review of a Kubernetes cluster, the team discovers that developers frequently pull container images directly from a public registry. To reduce the risk of running tampered images, which action at the orchestration layer provides the most effective technical safeguard?
Define NetworkPolicies that block outbound traffic from pods to untrusted container registries
Enable encryption of secrets stored in etcd using a KMS provider
Apply a restrictive seccomp profile to all containers in the cluster
Configure a validating admission controller to allow only container images that pass signature verification
Using a validating admission controller to enforce container-image signature verification intercepts every pod creation request and checks that each referenced image has a valid signature from a trusted key before the pod is admitted to the cluster. This stops unsigned or maliciously modified images from ever running. NetworkPolicies only control network traffic and cannot attest to an image's integrity. Encrypting secrets in etcd protects data at rest but does not verify the provenance of container images. A restrictive seccomp profile can limit the system calls a container makes, but it does not prevent a compromised or malicious image from being scheduled in the first place.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a validating admission controller in Kubernetes?
Open an interactive chat with Bash
How does container image signature verification work?
Open an interactive chat with Bash
Why are NetworkPolicies not sufficient for verifying container image integrity?
Open an interactive chat with Bash
What is a validating admission controller in Kubernetes?
Open an interactive chat with Bash
How does container image signature verification enhance security?
Open an interactive chat with Bash
Why don’t NetworkPolicies or seccomp profiles provide complete protection against tampered images?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .