ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 118 - 312-40 discussion

Report
Export

SevocSoft Private Ltd. is an IT company that develops software and applications for the banking sector. The security team of the organization found a security incident caused by misconfiguration in Infrastructure-as-Code (laC) templates. Upon further investigation, the security team found that the server configuration was built using a misconfigured laC template, which resulted in security breach and exploitation of the organizational cloud resources. Which of the following would have prevented this security breach and exploitation?

A.
Testing of laC Template
Answers
A.
Testing of laC Template
B.
Scanning of laC Template
Answers
B.
Scanning of laC Template
C.
Striping of laC Template
Answers
C.
Striping of laC Template
D.
Mapping of laC Template
Answers
D.
Mapping of laC Template
Suggested answer: B

Explanation:

Scanning Infrastructure-as-Code (IaC) templates is a preventive measure that can identify misconfigurations and potential security issues before the templates are deployed. This process involves analyzing the code to ensure it adheres to best practices and security standards.

Here's how scanning IaC templates could have prevented the security breach:

1.Early Detection: Scanning tools can detect misconfigurations in IaC templates early in the development cycle, before deployment.

1.Automated Scans: Automated scanning tools can be integrated into the CI/CD pipeline to continuously check for issues as code is written and updated.

1.Security Best Practices: Scanning ensures that IaC templates comply with security best practices and organizational policies.

1.Vulnerability Identification: It helps identify vulnerabilities that could be exploited if the infrastructure is deployed with those configurations.

1.Remediation Guidance: Scanning tools often provide guidance on how to fix identified issues, which can prevent exploitation.

Microsoft documentation on scanning for misconfigurations in IaC templates1.

Orca Security's blog on securing IaC templates and the importance of scanning them2.

An article discussing common security risks with IaC and the need for scanning templates3.

asked 18/09/2024
Md Ali Uz Zaman
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first