ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 115 - Professional Cloud DevOps Engineer discussion

Report
Export

As part of your company's initiative to shift left on security, the infoSec team is asking all teams to implement guard rails on all the Google Kubernetes Engine (GKE) clusters to only allow the deployment of trusted and approved images You need to determine how to satisfy the InfoSec teams goal of shifting left on security. What should you do?

A.
Deploy Falco or Twistlock on GKE to monitor for vulnerabilities on your running Pods
Answers
A.
Deploy Falco or Twistlock on GKE to monitor for vulnerabilities on your running Pods
B.
Configure Identity and Access Management (1AM) policies to create a least privilege model on your GKE clusters
Answers
B.
Configure Identity and Access Management (1AM) policies to create a least privilege model on your GKE clusters
C.
Use Binary Authorization to attest images during your CI CD pipeline
Answers
C.
Use Binary Authorization to attest images during your CI CD pipeline
D.
Enable Container Analysis in Artifact Registry, and check for common vulnerabilities and exposures (CVEs) in your container images
Answers
D.
Enable Container Analysis in Artifact Registry, and check for common vulnerabilities and exposures (CVEs) in your container images
Suggested answer: C

Explanation:

The best option for implementing guard rails on all GKE clusters to only allow the deployment of trusted and approved images is to use Binary Authorization to attest images during your CI/CD pipeline. Binary Authorization is a feature that allows you to enforce signature-based validation when deploying container images. You can use Binary Authorization to create policies that specify which images are allowed or denied in your GKE clusters. You can also use Binary Authorization to attest images during your CI/CD pipeline by using tools such as Container Analysis or third-party integrations. An attestation is a digital signature that certifies that an image meets certain criteria, such as passing vulnerability scans or code reviews. By using Binary Authorization to attest images during your CI/CD pipeline, you can ensure that only trusted and approved images are deployed to your GKE clusters.

asked 18/09/2024
Thomas Drilling
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first