ExamGecko
Question list
Search
Search

List of questions

Search

Question 74 - PCCSE discussion

Report
Export

The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?

A.
Ensure functions are not overly permissive.
Answers
A.
Ensure functions are not overly permissive.
B.
Ensure host devices are not directly exposed to containers.
Answers
B.
Ensure host devices are not directly exposed to containers.
C.
Ensure images are created with a non-root user.
Answers
C.
Ensure images are created with a non-root user.
D.
Ensure compliant Docker daemon configuration.
Answers
D.
Ensure compliant Docker daemon configuration.
Suggested answer: D

Explanation:

The question focuses on valid host compliance policies within a cloud environment. Among the given options, the most relevant to host compliance is ensuring compliant Docker daemon configuration. Docker daemon configurations are critical for securing the host environment where containers are run. A compliant Docker daemon configuration involves setting security-related options to ensure the Docker engine operates securely. This can include configurations related to TLS for secure communication, logging levels, authorization plugins, and user namespace remapping for isolation.

Ensuring functions are not overly permissive (Option A) and ensuring images are created with a non-root user (Option C) are more directly related to the security best practices for serverless functions and container images, respectively, rather than host-specific compliance checks. Ensuring host devices are not directly exposed to containers (Option B) is also important for security, but it falls under the broader category of container runtime security rather than host-specific compliance.

Thus, the most valid host compliance policy from the given options is to ensure a compliant Docker daemon configuration, as it directly impacts the security posture of the host environment in a containerized infrastructure. This aligns with best practices for securing Docker environments and is a common recommendation in container security guidelines, including those from Docker and cybersecurity frameworks.

Docker Documentation: Security configuration and best practices for Docker engine: https://docs.docker.com/engine/security/

CIS Docker Benchmark: Providing consensus-based best practices for securing Docker environments: https://www.cisecurity.org/benchmark/docker/

asked 23/09/2024
ahmed bin shehab
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first