
Ultimate access to all questions.
Your organization is planning to deploy a containerized application environment in Azure to support a new line of business applications. As the cybersecurity architect, you are tasked with defining a comprehensive security strategy for the container environment. The strategy must address secure container image management, runtime security, and monitoring and logging, while also considering Azure's shared responsibility model and compliance requirements. Which of the following approaches BEST ensures the security of the container environment in this scenario? (Choose one)
A
Focus solely on securing the containerized applications, assuming Azure's infrastructure security measures are sufficient for the underlying platform.
B
Deploy the container environment without additional security measures, relying on the container platform's default security settings.
C
Implement a layered security approach that includes secure container image management, runtime security, and comprehensive monitoring and logging, in alignment with Azure's best practices and compliance standards.
D
Limit container usage to a predefined list of applications and users, without implementing broader security measures for the container platform.