🥧 Happy Pi Day! Celebrate with 30% off all packages and plans — Today Only! 🥧

23 hours, 27 minutes remaining!
Bash, the Crucial Exams Chat Bot
AI Bot

Secure DevOps & CI/CD Pipeline Security (SCS-C03) Flashcards

AWS Certified Security Specialty SCS-C03 Flashcards

Study our Secure DevOps & CI/CD Pipeline Security (SCS-C03) flashcards for the AWS Certified Security Specialty SCS-C03 exam with 47+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
AWS Certified Security Specialty SCS-C03 Course Header Image
FrontBack
Give an example of policy engineOPA
Give an example of shift left activityRun static analysis and dependency checks in pre commit and CI pipelines
How do you prevent secrets in codeUse Secrets Manager or Systems Manager Parameter Store do not hardcode secrets in repositories
How to ensure provenance of buildsRecord build metadata sign artifacts and store provenance in an immutable log
How to handle transient CI credentialsIssue short lived credentials and prefer assume role patterns to reduce long lived secrets
How to harden build serversPatch regularly restrict network access minimize installed tools and run builds as non root
How to rotate secretsAutomate rotation using Secrets Manager or scripts and update consumers securely
How to secure Terraform stateStore state in encrypted remote backends use IAM controls and enable state locking
How to secure third party actions in CIPin versions review source and run in restricted environments with limited permissions
Name a best practice for container registriesRestrict push access use immutability and scan images on push
Name a popular IaC scanning tooltfsec
Name an access control best practice for third party actionsUse dedicated roles limit scopes and review action source and permissions
Name three ways to secure AWS CodePipelineUse IAM least privilege enable artifact encryption with KMS enable CloudTrail and CloudWatch logging
What does shift left testing meanMove security testing earlier into development such as local tests pre commit and CI
What is a compliance pipeline checkAutomated verification that resources comply with regulatory or internal policies
What is a security gate in CIAn automated check that must pass such as linting scanning tests or policy evaluation before promoting artifacts
What is an SBOMSoftware Bill Of Materials list of components and versions used to track vulnerabilities and licenses
What is artifact immutabilityStore build outputs as immutable versions to prevent modification after signing
What is blue green deploymentMaintain two identical environments and switch traffic to new version after validation
What is canary rollback criteriaDefine metrics thresholds such as error rate latency or alarms that trigger automatic rollback
What is container image provenanceMetadata that links image to source code build and dependencies for traceability
What is dependency scanningAutomated analysis of libraries to find known vulnerabilities and outdated versions
What is deployment canary testingGradual rollout to a subset of users to detect issues before full release
What is drift detectionCompare deployed resources to IaC to find unauthorized or out of band changes
What is IaC scanningAutomated scanning of CloudFormation Terraform and other templates to find insecure patterns
What is image scanning used forDetect vulnerable packages malware and misconfigurations in container images
What is least privilege in pipelinesGrant the minimum permissions needed to run each pipeline action and resource
What is pipeline hardeningImplement least privilege restrict access to pipeline resources encrypt artifacts enable logging and auditing
What is policy as codeDefine security rules in machine readable policies and enforce them automatically in CI
What is runtime policy for deploymentsControls applied at deployment time such as quotas network policies and pod security standards
What is SBOM use in pipelinesGenerate SBOMs during build to track components and accelerate vulnerability response
What is secret scanningAutomated detection of secrets in source code history and in commits
What is secrets injectionRuntime retrieval of secrets from a secure store instead of embedding in build or containers
What is signing of IaC templatesApply cryptographic signatures to templates to ensure authenticity before deployment
What is SLSAAn integrity framework for supply chains that defines levels of build provenance and tamper resistance
What should you do when a dependency has a CVEEvaluate impact update or patch or apply mitigations and redeploy
When should you scan container imagesScan at build time and before deployment and on a regular basis in registries
When to run SAST in CIEarly in the pipeline ideally pre merge to detect coding issues before integration
Why enable audit logging for CI systemsTo monitor changes detect unauthorized activity and support incident investigation
Why enforce immutable infrastructureReduce drift ensure reproducible deployments and facilitate rollback
Why integrate DAST in pipelinesFind runtime vulnerabilities and misconfigurations in running applications before production
Why isolate build environmentsLimit blast radius prevent cross project contamination and ensure clean build artifacts
Why perform dependency pinningPin to specific versions to avoid unexpected upgrades and improve reproducible builds
Why sign build artifactsEnsure provenance prevent tampering and enable traceability of production deployments
Why use canary analysis toolsTo automate traffic shifting monitoring and rollback based on defined health metrics
Why use multi stage buildsReduce final image surface by building tools separated and copying only runtime artifacts
Why validate CloudFormation templatesTo catch syntax errors insecure resources and missing properties before deployment

About the Flashcards

Flashcards for the AWS Certified Security Specialty exam help students review terminology, concepts, and key practices for securing CI/CD pipelines and software supply chains. Cards cover pipeline hardening, least-privilege access, artifact immutability, SBOMs, SLSA levels, and signing for build provenance, plus container image and dependency scanning to detect vulnerabilities.

Additional cards emphasize shift-left testing, SAST and DAST placement, IaC scanning and template signing, Terraform/CloudFormation validation, secure Terraform state, policy as code (OPA), secret injection and rotation, audit logging, security gates in CI, and deployment practices such as canary and blue-green rollouts with rollback criteria.

Topics covered in this flashcard deck:

  • Pipeline hardening
  • Artifact provenance & signing
  • Image and dependency scanning
  • Infrastructure as Code
  • Secrets and access control
  • Deployment strategies & testing
Share on...
Follow us on...