Violations Flashcards

1
Q

What types of security findings are possible with ACS

A

1) Vulnerabilities
2) violations of DevOps best practices
3) high-risk build and deployment practices
4) suspicious runtime behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are violations

A

1) Records all specific times where policy criteria have been met.

2) “stream” of events that have occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some typical attacker goals?

A

1) gain a foothold
2) maintain a presence
3) move laterally
4) exfiltrate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key ACS violation operations

A

view policy violations
drill down to the actual cause of the violation
take corrective actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When is violation reported?

A

When an enabled policy fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are forensic data needed need in a runtime violation?

A

who, what, when, where, and why

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are violations per deployments or pods?

A

deployments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens if you not resolve a Violation in a Deployment, or if the same violation happened again

A

events and details are summarized in the same violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What tabs do I see when i select a violation?

A

Policy
Deployment
Violation (events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What information do I see when I click on the policy tab of a violation?

A

description
rationale
guidance
lifecycle stage (deploy, build, runtime)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between runtime violation events and deployment violation events?

A

Runtime violation events include alot more information compare to deployment violation events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information are shown in a runtme violation event?

A

1) Binaries
2) First occurence
3) Last occurence
4) User ID
5) Arguments
6) Time
7) Container ID

Missing: enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What information are shown in a deployment violation event?

A

List of events with each event being a text line containing severity, component, container name and version of component that includes the fix, and policy enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you use runtime incidents as learning opportunities to improve security

A

By apply the remediation steps that are included with each violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly