The correct answer is scanning container images for vulnerabilities and misconfigurations. Container images often include operating system components, libraries, and application dependencies that may contain security vulnerabilities. Regular scanning helps identify and remediate these issues before the containers are deployed.
Implementing Mandatory Access Control restricts what processes running inside containers can do, but it's typically more complex to implement and maintain in development environments.
Deploying runtime container behavioral monitoring with anomaly detection is a sophisticated security measure that helps detect suspicious activities during container execution. However, this is a detective control rather than a preventive one, and is more appropriate for production environments where understanding active threats is critical.
Enforcing cryptographic verification of container image integrity and provenance ensures containers haven't been tampered with and come from trusted sources. While important, this control verifies the authenticity of containers rather than identifying inherent vulnerabilities or misconfigurations that might exist in properly signed container images.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a container image and why is it important to scan them?
Open an interactive chat with Bash
What are some common vulnerabilities found in container images?
Open an interactive chat with Bash
How does scanning for vulnerabilities differ from cryptographic verification?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access