ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 254 - PT0-002 discussion

Report
Export

A penetration tester uncovers access keys within an organization's source code management solution. Which of the following would BEST address the issue? (Choose two.)

A.
Setting up a secret management solution for all items in the source code management system
Answers
A.
Setting up a secret management solution for all items in the source code management system
B.
Implementing role-based access control on the source code management system
Answers
B.
Implementing role-based access control on the source code management system
C.
Configuring multifactor authentication on the source code management system
Answers
C.
Configuring multifactor authentication on the source code management system
D.
Leveraging a solution to scan for other similar instances in the source code management system
Answers
D.
Leveraging a solution to scan for other similar instances in the source code management system
E.
Developing a secure software development life cycle process for committing code to the source code management system
Answers
E.
Developing a secure software development life cycle process for committing code to the source code management system
F.
Creating a trigger that will prevent developers from including passwords in the source code management system
Answers
F.
Creating a trigger that will prevent developers from including passwords in the source code management system
Suggested answer: A, E

Explanation:

Access keys are credentials that allow users to authenticate and authorize requests to a source code management (SCM) system, such as GitLab or AWS. Access keys should be kept secret and not exposed in plain text within the source code, as this can compromise the security and integrity of the SCM system and its data.

Some possible options for addressing the issue of access keys within an organization's SCM solution are:

Setting up a secret management solution for all items in the SCM system: This is a tool or service that securely stores, manages, and distributes secrets such as access keys, passwords, tokens, certificates, etc. A secret management solution can help prevent secrets from being exposed in plain text within the source code or configuration files3456.

Developing a secure software development life cycle (SDLC) process for committing code to the SCM system: This is a framework or methodology that defines how software is developed, tested, deployed, and maintained. A secure SDLC process can help ensure that best practices for security are followed throughout the software development process, such as code reviews, static analysis tools, vulnerability scanning tools, etc. A secure SDLC process can help detect and prevent access keys from being included in the source code before they are committed to the SCM system1.

asked 02/10/2024
Javier Cardaba Enjuto
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first