ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
Your organization receives a third-party microservice as a container image, which must move from the vendor's registry to your staging registry and then to production. To maintain an auditable chain of custody for the image during each hand-off, which control provides the strongest assurance?
Import the image only after receiving the vendor's most recent vulnerability scan report.
Store the image in an internal private registry that is protected by network firewalls.
Require every repository to validate a vendor-issued digital signature and record the image's cryptographic hash and handler identity at each transfer.
Move the image only over SFTP with user passwords rotated on a quarterly schedule.
The most effective way to enforce an end-to-end chain of custody is to use cryptographic mechanisms that prove both origin and integrity at every transfer point and to record who handled the artifact. Requiring each repository to validate a vendor-supplied digital signature while logging the verified hash and the identity of the individual or process that performed the transfer establishes immutable evidence that the component is authentic, unaltered, and traceable through its entire lifecycle. Secure transport methods such as SFTP, network segmentation, or requesting a vulnerability report improve security but do not by themselves create a verifiable custody trail. Without verified signatures and logged hash values, tampering between hops could go undetected, and the organization would lack defensible records of custody.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a digital signature in the context of container images?
Open an interactive chat with Bash
What is a cryptographic hash and how is it used to maintain an auditable chain of custody?
Open an interactive chat with Bash
Why is logging the handler identity important for an auditable chain of custody?
Open an interactive chat with Bash
Why is a vendor-issued digital signature important for ensuring an auditable chain of custody?
Open an interactive chat with Bash
What is the role of a cryptographic hash in maintaining chain of custody?
Open an interactive chat with Bash
How does logging the handler's identity during hand-offs improve the custody chain?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Supply Chain
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .