ExamGecko
Question list
Search
Search

Question 83 - PCCET discussion

Report
Export

With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?

A.
container, code, cluster, cloud
Answers
A.
container, code, cluster, cloud
B.
code, container, cluster, cloud
Answers
B.
code, container, cluster, cloud
C.
code, container, cloud, cluster
Answers
C.
code, container, cloud, cluster
D.
container, code, cloud, cluster
Answers
D.
container, code, cloud, cluster
Suggested answer: B

Explanation:

Cloud-native security is the integration of security strategies into applications and systems designed to be deployed and to run in cloud environments. It involves a layered approach that considers security at every level of the cloud-native application architecture.The four C's of cloud-native security are123:

Code: This layer refers to the application code and its dependencies. Security at this layer involves ensuring the code is free of vulnerabilities, using secure coding practices, and implementing encryption, authentication, and authorization mechanisms.

Container: This layer refers to the lightweight, isolated units that encapsulate the application and its dependencies. Security at this layer involves scanning and verifying the container images, enforcing policies and rules for container deployment and runtime, and isolating and protecting the containers from unauthorized access.

Cluster: This layer refers to the group of nodes that host the containers and provide orchestration and management capabilities. Security at this layer involves securing the communication between the nodes and the containers, monitoring and auditing the cluster activity, and applying security patches and updates to the cluster components.

Cloud: This layer refers to the underlying infrastructure and services that support the cloud-native applications. Security at this layer involves configuring and hardening the cloud resources, implementing identity and access management, and complying with the cloud provider's security standards and best practices.

The correct order of the four C's from the top (surface) layer to the bottom (base) layer iscode, container, cluster, cloud, as each layer depends on the security of the next outermost layer.Reference:What Is Cloud-Native Security? - Palo Alto Networks,What is Cloud-Native Security? An Introduction | Splunk,The 4C's of Cloud Native Kubernetes security - Medium

asked 23/09/2024
Ivan Mazala
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first