
Ultimate access to all questions.
Your company is transitioning to container technology for deploying its applications to improve scalability and efficiency. As the Cybersecurity Architect, you are tasked with ensuring the security of these containers. The company operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must be cost-effective and scalable to accommodate future growth. Considering these constraints, which of the following security measures is the MOST critical to specify for the container runtime to ensure both security and compliance? (Choose one option)
A
Ensure that all container images are sourced from trusted registries and are regularly scanned for vulnerabilities, with a focus on maintaining compliance with industry standards.
B
Implement strict network policies for secure communication between containers and enforce process isolation to prevent cross-container attacks, aligning with the principle of least privilege.
C
Deploy an advanced container orchestration platform with built-in security features, ensuring that all containers are managed through a centralized, secure interface.
D
Rely solely on the container technology provider's default security settings, assuming they meet all regulatory and compliance requirements without additional configuration.