DEVSECOPS – SECURING THE CI/CDPIPELINE & CONTINUOUS SECURITY
76 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What method did the hackers use to compromise the SolarWinds software supply chain?

  • Unauthorized access to SolarWinds servers
  • Malicious injection into software updates (correct)
  • Social engineering attacks on SolarWinds employees
  • Denial of service attacks on SolarWinds infrastructure
  • What is the NPM Node Package Manager primarily used for?

  • Managing financial transactions
  • Storing personal documents
  • Organizing email communication
  • Exchanging software packages (correct)
  • What is the purpose of Scopes in NPM Node Package Manager?

  • Creating data backups
  • Monitoring system performance
  • Grouping similar software development packages (correct)
  • Managing user profiles
  • How did the attackers achieve unfettered package change under a Scope in NPM?

    <p>Using a specially written pull request</p> Signup and view all the answers

    What type of vulnerability led to remote code execution in Cloudflare?

    <p>Unsafe zip archive extraction</p> Signup and view all the answers

    What is the primary goal of security in the pipeline (SIP) according to the text?

    <p>Discovering defects and errors in the code</p> Signup and view all the answers

    What are some of the important benefits of continuous integration and continuous delivery/deployment (CI/CD)?

    <p>Saves time for developers and allows more time for code creation</p> Signup and view all the answers

    Why is security often a concern in the CI/CD pipeline?

    <p>CI/CD is quick, but security measures are typically slow</p> Signup and view all the answers

    How does DevSecOps aim to change the speed and delivery of software security?

    <p>By integrating security controls as part of the software being developed</p> Signup and view all the answers

    Why is it critical for developers to understand what is happening during software development and deployment in the context of security?

    <p>To ensure that security is not compromised in the development and deployment process</p> Signup and view all the answers

    What role does DevSecOps play in the development and deployment process?

    <p>It aims to integrate security as a design constraint in the software being developed</p> Signup and view all the answers

    What does CI/CD save an enormous amount of for developers?

    <p>Time</p> Signup and view all the answers

    What makes CI/CD pipelines a desirable target for adversaries?

    <p>They manage the whole software lifecycle</p> Signup and view all the answers

    How can attackers potentially exploit the trust connection between code repositories and servers in CI/CD pipelines?

    <p>By exploiting code modifications and commits</p> Signup and view all the answers

    Why are containers considered a secure solution for executing programs in CI/CD pipelines?

    <p>They are isolated from each other</p> Signup and view all the answers

    What is a supply chain assault in the context of CI/CD pipeline security?

    <p>An attempt to spoof users through third-party software</p> Signup and view all the answers

    What is the significance of the SolarWinds Orion supply chain breach?

    <p>It infiltrated networks, systems, and data of thousands of organizations</p> Signup and view all the answers

    What made SolarWinds a valuable target for the supply chain assault?

    <p>Its privileged access to IT systems and extensive deployment</p> Signup and view all the answers

    What is the purpose of a Web Application Firewall (WAF)?

    <p>To safeguard web applications by filtering, monitoring, and blocking harmful HTTP/S traffic</p> Signup and view all the answers

    Which type of WAF implementation is typically the most expensive and requires physical equipment?

    <p>Network-based WAF</p> Signup and view all the answers

    What is the main advantage of a cloud-based WAF?

    <p>Low upfront cost and continuous updates without additional effort or cost</p> Signup and view all the answers

    What does Runtime Application Self-Protection (RASP) technology perform?

    <p>A server-based technique that activates when an application is launched to identify and stop real-time attacks</p> Signup and view all the answers

    What is the purpose of Continuous esecurity?

    <p>To swiftly identify, prioritize, diagnose, and fix performance problems interfering with regular service operation</p> Signup and view all the answers

    What does Hypertext Transfer Protocol Secure (HTTPS) refer to?

    <p>HTTP over transport layer security (TLS) or HTTP over secure socket layer (SSL)</p> Signup and view all the answers

    What is the main purpose of Cloud Security Posture Management (CSPM)?

    <p>Automating risk assessment and mitigation across different cloud systems</p> Signup and view all the answers

    What is the primary focus of Security Around the Pipeline (SAP)?

    <p>Protecting the pipeline from being bypassed</p> Signup and view all the answers

    Why is continuous security integration crucial for contemporary systems?

    <p>To continually safeguard infrastructure and applications</p> Signup and view all the answers

    What is the primary function of Kubernetes in the context of software security?

    <p>Simplifying container orchestration technology</p> Signup and view all the answers

    Why is it necessary to include continuous security validation into CI/CD pipelines?

    <p>To detect holes and misconfigurations in the code</p> Signup and view all the answers

    What does Security of the Pipeline (SOP) primarily focus on protecting?

    <p>The posture of system processes targeted by malware</p> Signup and view all the answers

    What is the primary function of RASP in the context of application security?

    <p>To identify and resolve security issues within the application</p> Signup and view all the answers

    In which mode does RASP attempt to prevent security issues from occurring?

    <p>Protective mode</p> Signup and view all the answers

    How do developers implement RASP using function calls found in an app’s source code?

    <p>By accessing the RASP technology</p> Signup and view all the answers

    What is the ultimate effect of implementing RASP in an application's security?

    <p>It combines a firewall with the program’s runtime environment</p> Signup and view all the answers

    What is the primary purpose of application security monitoring?

    <p>To notify administrators of malicious activity</p> Signup and view all the answers

    What capability is unavailable to security solutions that operate 'outside' apps?

    <p>Identifying strange activities that contradict business principles</p> Signup and view all the answers

    What advantage do application security monitoring solutions have over embedding monitoring code into each application?

    <p>They have extensive knowledge and expertise on attacks and abuses</p> Signup and view all the answers

    What is the primary function of logging in an application?

    <p>To ensure compliance with security laws</p> Signup and view all the answers

    What is the primary purpose of Incident Response?

    <p>To promptly detect and stop attacks</p> Signup and view all the answers

    What is the primary objective when Containment of attackers and incident activity is performed?

    <p>To reach this level as soon as possible to limit the amount of damage caused</p> Signup and view all the answers

    What is the significance of Incident Response Frameworks?

    <p>They assist companies in the creation of standardized response strategies</p> Signup and view all the answers

    Why is a risk assessment conducted during the Preparation of processes and systems phase of Incident Response?

    <p>To prioritize the protection of high-priority assets</p> Signup and view all the answers

    What is the main focus during the Identification of occurrences phase of Incident Response?

    <p>To detect and identify any unusual behavior using tools and processes specified during the planning phase</p> Signup and view all the answers

    What is typically performed during Short-term containment as part of Incident Response?

    <p>Imminent threats are contained in situ</p> Signup and view all the answers

    What is the primary function of the National Institute of Standards and Technology (NIST) incident response methodology?

    <p>To develop an IR plan and an IR team</p> Signup and view all the answers

    1

    <p>It provides instructions on how to develop a communication plan and training scenarios.</p> Signup and view all the answers

    What is typically performed during Short-term containment as part of Incident Response?

    <p>Imminent threats are contained in situ.</p> Signup and view all the answers

    What is the primary responsibility of a cloud computing provider according to the shared responsibility model?

    <p>Providing services and storage such as the virtualization layer, disks, and networks</p> Signup and view all the answers

    What is the primary role of bug bounty programs in proactive security management?

    <p>Crowdsourcing security knowledge via a formal program and paying rewards for defects discovered</p> Signup and view all the answers

    What is the responsibility of users in the software as a service (SaaS) model of cloud computing?

    <p>Protecting the security of the subscriptions and login credentials of their users</p> Signup and view all the answers

    What is the primary function of Red teaming exercises in cybersecurity?

    <p>Simulating cyberattacks to identify vulnerabilities</p> Signup and view all the answers

    Which type of cloud service model places more security responsibilities on the users as they go from SaaS to PaaS and to IaaS?

    <p>Infrastructure as a service (IaaS)</p> Signup and view all the answers

    What is the purpose of hiring white-hat hackers in bug bounty programs?

    <p>Uncovering previously undisclosed vulnerabilities</p> Signup and view all the answers

    What is the main responsibility of a company's IT staff and employees in a shared responsibility model for cloud security?

    <p>Accountable for the security of that infrastructure, as well as the applications and data that run on it</p> Signup and view all the answers

    What is the primary focus of Red Hat’s Ansible Playbook in the context of patching process automation?

    <p>Ensuring correct and consistent application of fixes by automating patching process</p> Signup and view all the answers

    "Traditional information security checked for security at the conclusion of an application, whereas continuous security tests for security in parallel from start to finish" – Which concept does this statement refer to?

    <p>Continuous security</p> Signup and view all the answers

    What are the four stages of the incident response framework according to Cichonsk et al. (2012)?

    <p>Preparation, Detection and analysis, Containment, Post-incident activity</p> Signup and view all the answers

    What is a key contribution to cybersecurity by SANS?

    <p>Incident Response Framework</p> Signup and view all the answers

    What is the process of revealing security vulnerabilities in computer software or hardware known as?

    <p>Vulnerability Disclosures</p> Signup and view all the answers

    What do patches modify in an operating system, platform, or application?

    <p>Existing software</p> Signup and view all the answers

    What is the primary purpose of patch management in systems administration?

    <p>To protect against malware and cyberattacks</p> Signup and view all the answers

    Which entity implemented the coordinated vulnerability disclosure (CVD) concept?

    <p>Microsoft</p> Signup and view all the answers

    What does automating patch management help to reduce?

    <p>Human errors</p> Signup and view all the answers

    What is the primary advantage of combining patch management with automation technologies?

    <p>Limited human errors</p> Signup and view all the answers

    What type of vulnerabilities do bug bounties and vulnerability rewards programs aim to address?

    <p>Software vulnerabilities</p> Signup and view all the answers

    Which organization collaborated on security-related research and public education to present the SANS incident response framework?

    <p>SANS</p> Signup and view all the answers

    What is the main benefit of using logs to test apps prior to deploying them into production?

    <p>Identifying security flaws before they become exploitable vulnerabilities</p> Signup and view all the answers

    What is the direct impact of the length of time a vulnerability remains exploitable?

    <p>Financial, brand, and consumer trust costs</p> Signup and view all the answers

    How does logging and effective log management contribute to improving collaboration between teams?

    <p>By enabling real-time monitoring and coordination of modifications</p> Signup and view all the answers

    What is the primary role of logs in the context of application security?

    <p>Identifying security flaws before deployment</p> Signup and view all the answers

    Why is the use of logs important in the context of software development and deployment?

    <p>To prevent vulnerabilities from entering production environments</p> Signup and view all the answers

    What aspect does effective log management aim to enhance in the context of application development?

    <p>Coordination between development and IT operations teams</p> Signup and view all the answers

    What impact does the presence of vulnerabilities in deployed applications have on other team members?

    <p>It saves time that would have been spent detecting them</p> Signup and view all the answers

    Why might vulnerabilities delivered into production remain exploitable for several hours or even days?

    <p>Owing to the absence of effective log management</p> Signup and view all the answers

    What is the primary purpose of a top-tier log management application in the context of application security?

    <p>To identify security flaws before deploying apps into production</p> Signup and view all the answers

    How does log management contribute to reducing costs related to security flaws?

    <p>By minimizing financial costs through efficient log analysis</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser