
Answer-first summary for fast verification
Answer: Implement a layered security approach that includes secure container image management, runtime security, and comprehensive monitoring and logging, in alignment with Azure's best practices and compliance standards.
The BEST approach to ensure the security of the container environment is to implement a layered security strategy that covers secure container image management, runtime security, and proper monitoring and logging. This approach aligns with Azure's shared responsibility model, where the customer is responsible for securing their applications and data, and Microsoft ensures the security of the cloud infrastructure. Option A is incorrect because it neglects the customer's responsibility to secure the container platform and applications. Option B is incorrect as it assumes the container platform's default settings are sufficient, which may not address all security vulnerabilities. Option D is too restrictive and does not provide a comprehensive security strategy for the container environment.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your organization is planning to deploy a containerized application environment in Azure to support a new line of business applications. As the cybersecurity architect, you are tasked with defining a comprehensive security strategy for the container environment. The strategy must address secure container image management, runtime security, and monitoring and logging, while also considering Azure's shared responsibility model and compliance requirements. Which of the following approaches BEST ensures the security of the container environment in this scenario? (Choose one)
A
Focus solely on securing the containerized applications, assuming Azure's infrastructure security measures are sufficient for the underlying platform.
B
Deploy the container environment without additional security measures, relying on the container platform's default security settings.
C
Implement a layered security approach that includes secure container image management, runtime security, and comprehensive monitoring and logging, in alignment with Azure's best practices and compliance standards.
D
Limit container usage to a predefined list of applications and users, without implementing broader security measures for the container platform.
No comments yet.