Trusted Images Flashcards

1
Q

What is the functionality of Trusted Images?

A

allows to declare, by policy, which registries, repositories, and images are trusted, and how to respond when untrusted images are started in an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should an organization do in order to protect itself from malicious third party container images?

A

organizations should maintain a set of trusted images and registries and ensure that only images from this set are allowed to run in their environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is required in order to be able to use Trusted Images functionality?

A

container Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is trusting images by image tag supported

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are Trusted Images supported for workloads protected by App-Embedded Defender?

Including Fargate

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can trust be established?

A
  1. point of origin (registry and/or repository)
  2. base layer(s)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is trust established based on base layers?

A
  • images can have layers in common
  • trust is established by matching the base layer hashes of a new image to a pre-approved base image, ensuring compliance and security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where are Trusted Images configured?

A

Runtime Security > Defend > Compliance > Trusted Images > Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the possible effects for untrusted images?

A
  1. Alert
  2. Block
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the very first step when configuring Trusted Images?

A

this functionality needs to be enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Trust Groups?

A

specify good and bad images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are Trust Groups used?

A

in trust policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do Trust Groups collect?

A

related registries, repositories, and images in a single entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the default policy consist of?

A

a single rule that alerts on all images started in the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can rukes define? (3)

A
  1. explicitly allowed trust groups
  2. explicitly denied trust groups
  3. an action to take when an image isn’t trusted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many Trusted Image policies is it possible to configure?

A

1

15
Q

How is the Trusted Image policy evaluated?

A

from top down

16
Q

What is the Trusted Image Policy built on?

A

rules

17
Q

When a matching rule is found, the rule is processed. Are subsequent rules processed?

A

no