TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/quiz/Use-these-CCSK-practice-questions-to-prep-for-the-exam

Use these CCSK practice questions to prep for the exam

By Sharon Shea

Cloud security is one of the most in-demand skills for IT employees. To prove they have a baseline knowledge of cloud security, many professionals are boosting their resumes with the Certificate of Cloud Security Knowledge.

With virtualization and containers as two key concepts in the cloud, knowing how to secure them is vital, and they constitute one of the 14 domains of the CCSK.

In this excerpt of Chapter 8 from CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide by Graham Thompson, published by McGraw-Hill, learn about the various components of cloud containers, and read a number of container security recommendations and best practices for deploying containers. Then, test what you've learned with sample CCSK practice questions.

Be sure to check out a Q&A with Thompson for more insights on the CCSK, and download the entire chapter PDF for more guidance and questions.

CCSK exam guide coverClick to learn more about
the CCSK cert exam guide
by Graham Thompson.

Containers

In Chapter 7, I mentioned that containers could help address portability but that this technology relies on more than just source code and that all components need to be properly secured. This section covers the various components of a container system and the high-level security recommendations from the CSA. Note that although container technology is fairly mature, it is a rapidly evolving technology.

You know that containers are a compute virtualization technology and that they differ from virtual machines in that only the application and required dependencies are bundled in a container, which is then run in an isolated user space on a shared kernel. Containers can run directly on a physical server (even a laptop), or they can run in a virtual machine.

NOTE

A container is an abstraction at the application layer that isolates software from its environment. Containers don't necessarily provide full-stack security isolation, but they do provide task segregation. On the other hand, virtual machines typically do provide security isolation. You can put tasks of equivalent security context on the same set of physical or virtual hosts to provide greater security segregation.

Container systems always have the following components:

EXAM TIP

For image repository, I'm using the naming used in the CSA Guidance, but you should know about two related concepts—image registries and image repositories. An image registry is used to host and distribute images. An image repository is technically different, because it is defined as a collection of related images. Long story short, this means that an image registry can contain multiple repositories. You'll often see these terms used interchangeably. Your CCSK exam will use the term "image repository."

Keeping all of these elements in mind, I hope you can appreciate how there may be some proprietary dependencies in place that make portability a bit more difficult than you may have expected. For example, what about moving a container from Windows to Linux runtimes (and vice versa)? What if you presently use Kubernetes as the orchestration and scheduling service and then decide to use a cloud provider's orchestration service instead? Are the runtimes backward-compatible? As I said, a container can help with portability, but it isn't a guaranteed magic bullet for portability.

Container Definitions Backgrounder

As you know, containers are built and managed according to a definition file you create. The definition file is passed to a service (daemon) to build an image so it is properly allocated resources and other configuration settings are implemented.

NOTE

Container definition files are not in the CSA Guidance and therefore will not be covered in your CCSK exam. They are covered here to give you a better understanding of how containers are configured and managed.

Following is a list of some of the available options in configuration files used by Amazon Elastic Container Service (Amazon ECS) to build and manage containers:

Now you should have a pretty good idea of how containers are built and how the orchestration and scheduling service launches and maintains containers. Again, you won't be tested on any of these items.

Container Security Recommendations

As I mentioned, container technology is maturing, but many products out there have their own security requirements. Following is a list of security recommendations from the CSA as to general security best practices that you should consider when deploying container technology internally or within a cloud environment:

NOTE

These are general best practices. Always consult vendor documentation for the latest product-dependent security recommendations. Check out the Cloud Security Alliance web site for more in-depth container security recommendations, such as the "Best Practices for Implementing a Secure Application Container Architecture." Also, the Center for Internet Security provides industry recommendations on securing specific products such as Docker and Kubernetes.

A final takeaway for security of a container environment is that tools will offer varying degrees of security. At a bare minimum, all products should have strong access controls and authentication capabilities. They should also support secure configurations that isolate file system, process, and network access.

CCSK practice questions

About the author

Graham ThompsonGraham Thompson

Graham Thompson is the founder and CTO of Intrinsec Security, a cloud security consulting and training organization that serves enterprises and governments across North America. He is a security professional with more than 25 years of experience in areas such as systems engineering, technical architecture, vulnerability assessment and a variety of management roles. He has built successful multimillion-dollar security solutions for leading enterprises and government agencies.

Since 2010, Thompson has dedicated himself to cloud security. He has architected and assessed cloud security solutions for government agencies and Fortune 500 financial, telecom and retail companies across North America. He is a CSA and (ISC)2 authorized trainer of CCSK, Certified Information Systems Security Professional (CISSP) and Certified Cloud Security Professional (CCSP), a course he helped develop as a subject matter expert.

In addition to his CSA and (ISC)2 certifications, Thompson has obtained multiple certifications, including Amazon, ISACA (Certified Information Systems Auditor), Microsoft (Microsoft Certified Solutions Expert), Cisco, Symantec, Fortinet, SANS and others. He attended McGill University in Montreal and has been an adjunct professor for multiple security courses at Algonquin College in Ottawa.

20 May 2020

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement