Policies Flashcards

1
Q

What is the heart of ACS?

A

policy engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantage of a single policy engine for all lifecycle stages?

A

Policy criteria can cross all lifecycles stages; build, deploy, run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you access the Policy menu?

A

Platform Configuration > Policy Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are attributes of a policy?

A

Severity
Rationale
Guidance
Description
Policy criteria
Type
Category
Scope
Lifecycle stages
Event source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hey ACS philosophy

A

empower developers to understand and resolve security issues in their own deployments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the benefit of build time policy enforcement?

A

allows the build process to fail as soon as a serious, fixable vulnerability is identified in an image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you configure policies for enforcement at build time?

A

command line or Pipelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

configure a policy for enforcement

A

1) Go to : Platform Configuration → Policy Management
2) Identify the policy and the three dots on the right
3) Click on the 3 dots to enable the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CLI command to check image for violations of a policy

A

1) oc get route -n stackrox
2) roxctl -e $ROUTE:443 image check –image docker.io/vulnerables/cve-2017-7494 –insecure-skip-tls-verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of build time policy enforcements

A

1) Trigger build-time violations for images and deployments on the CLI and CI/CD pipelines

2) Enforce a container image vulnerability violation at build time

3) Codify an image vulnerability violation enforcement in a pipeline

4) Warn about deployment attributes from the command line and Pipeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RHACS can prevent the deployment of applications that violate workflow, configuration, or security best practices before they become actively running containers. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two approaches to enforcing deploy-time policies in RHACS

A

1) In clusters with listen and enforce AdmissionController options enabled, RHACS uses the admission controller to reject deployments that violate policy.

2) In clusters where the enforcement option is disabled, RHACS scales pod replicas to zero for deployments that violate policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you turn on admission controller

A

1) Platform Configuration > Clusters > Your cluster
2) Turn on feature related to Admission controller and dynamic sync

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Test if unscanned images are enforced

A

1) Verify that admission controller is enabled
2) Pick an image that was not scanned
3) Create an application with this image: oc run nonsense –image=test-nonsense:latest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prevent the deployment of applications that mishandle sensitive data

A

roxctl -e $CENTRAL:443 deployment check –file ./deployment.yaml –insecure-skip-tls-verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example of use of Runtime policies

A

threat detection
thread prevention
incident investigation
incident response

17
Q

Runtime policy enforcement features

A

1) Prevent execution of package manager binary
2) Report and resolve violations
3) observes the processes running in containers
4) collects information about process to write policies.
5) create baseline policy configurations

18
Q

Why have a policy to prevent Eeecution of package manager binaries such as apk, apt, or yum?

A

using a package manager to install or remove software on a running container violates the immutable principle of container operation.

19
Q

How does ACS detects and avoids a runtime violation

A

1) using Linux kernel instrumentation to detect the running process
2) using K8S to terminate the pod for enforcement.

20
Q

Enable enforcement of a policy

A

1) Go to Platform Configuration > Policy Management > Policy
2) Edit the policy
3) Enable inform and enforce