exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 156 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 156
Topic #: 1
[All AWS Certified Security - Specialty Questions]

Developers in an organization have moved from a standard application deployment to containers. The Security Engineer is tasked with ensuring that containers are secure.
Which strategies will reduce the attack surface and enhance the security of the containers? (Choose two.)

  • A. Use the containers to automate security deployments.
  • B. Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries.
  • C. Segregate container by host, function, and data classification.
  • D. Use Docker Notary framework to sign task definitions.
  • E. Enable container breakout at the host kernel.
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Priya20
Highly Voted 3 years, 7 months ago
correct answer is B,C
upvoted 27 times
...
Ayusef
Highly Voted 3 years, 6 months ago
Guys I have done this at work its B and C.. So the break down is B,, resource consumption is a classic sign of possible attack on containers and C,, segmenting of containers by function is a best practices,, On the other hand D,, is Docker specific.
upvoted 7 times
Ayusef
3 years, 6 months ago
Correction this is B...D.... Notary is used for security of Docker. In container security isolation is important and I wen that route in the question but its not possible to isolate in the manner of C due to shared kernel.
upvoted 5 times
...
...
chauhm_111
Most Recent 1 year, 10 months ago
Selected Answer: BC
Felt a deja vu on this one
upvoted 1 times
...
vavofa5697
2 years ago
Selected Answer: BC
B. Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries: AWS's "Best practices for building containers" guide highlights the importance of limiting resource consumption, networking connections, ports, and removing unnecessary container libraries to minimize the attack surface: https://aws.amazon.com/blogs/containers/best-practices-for-building-containers/ C. Segregate container by host, function, and data classification: - AWS's "Securing Amazon ECS container instances" documentation discusses segregating containers based on their function and data classification: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-container-security.html - The AWS Well-Architected Framework's "Security Pillar" also highlights the importance of segregating containers and applying the principle of least privilege: https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf
upvoted 1 times
...
ITGURU51
2 years ago
https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/sec_protect_compute_reduce_surface.html Answer BC
upvoted 1 times
...
VijiTu
2 years, 8 months ago
https://www.trendmicro.com/en_us/what-is/container-security.html This links supports C more than D So choosing B and C
upvoted 2 times
...
Rja148393
2 years, 9 months ago
Selected Answer: BC
Not selecting D since its docker specific and task definition seems vague
upvoted 3 times
...
sapien45
2 years, 9 months ago
Selected Answer: BD
You should configure tasks with CPU and memory limits to minimize the following risk. A task's resource limits set an upper bound for the amount of CPU and memory that can be reserved by all the containers within a task. If no limits are set, tasks have access to the host's CPU and memory. This can cause issues where tasks deployed on a shared host can starve other tasks of system resources. Notary is the available community-supported tool that would allow for signing and verifying OCI/Docker
upvoted 1 times
...
jackfei
2 years, 11 months ago
BC,i think is correct answer
upvoted 1 times
...
mongiam
3 years ago
Selected Answer: BD
B, since, resource consumption is a classic sign of a possible attack on containers. D, since, the notary is used for the security of Docker.
upvoted 1 times
...
MoreOps
3 years ago
Selected Answer: BC
Dup question, Its C and C
upvoted 3 times
...
TigerInTheCloud
3 years ago
Selected Answer: BD
Had trouble with selecting C or D. D seems right, but the "host' mentioned in C let me feel uncomfortable. After reading https://www.cncf.io/blog/2021/07/28/enforcing-image-trust-on-docker-containers-using-notary/, and plan to use Notary in my work in the future.
upvoted 1 times
...
ceros399
3 years, 1 month ago
Selected Answer: BC
BC - when you reduce the attack surface, you need to limit the accessibility to resources by container.
upvoted 4 times
...
Radhaghosh
3 years, 3 months ago
Answer is B & C. Docker Notary is just a destruction.
upvoted 1 times
...
ThomasConor
3 years, 6 months ago
Docker Notary is used to sign images not task definitions. So B, C.
upvoted 1 times
...
DahMac
3 years, 6 months ago
AWS Says B and ? https://docs.aws.amazon.com/AmazonECS/latest/bestpracticesguide/security-tasks-containers.html and C https://docs.aws.amazon.com/AmazonECS/latest/bestpracticesguide/security-network.html
upvoted 2 times
...
skipbaylessfor3
3 years, 6 months ago
According to the Zeal Vora course its BC... I trust him a little more lol
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago