{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Trusted Images Flashcards

(19 cards)

1
Q

What is the functionality of Trusted Images?

A

allows to declare, by policy, which registries, repositories, and images are trusted, and how to respond when untrusted images are started in an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should an organization do in order to protect itself from malicious third party container images?

A

organizations should maintain a set of trusted images and registries and ensure that only images from this set are allowed to run in their environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is required in order to be able to use Trusted Images functionality?

A

container Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is trusting images by image tag supported

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are Trusted Images supported for workloads protected by App-Embedded Defender?

Including Fargate

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can trust be established?

A
  1. point of origin (registry and/or repository)
  2. base layer(s)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is trust established based on base layers?

A
  • images can have layers in common
  • trust is established by matching the base layer hashes of a new image to a pre-approved base image, ensuring compliance and security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where are Trusted Images configured?

A

Runtime Security > Defend > Compliance > Trusted Images > Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the possible effects for untrusted images?

A
  1. Alert
  2. Block
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the very first step when configuring Trusted Images?

A

this functionality needs to be enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Trust Groups?

A

specify good and bad images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are Trust Groups used?

A

in trust policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do Trust Groups collect?

A

related registries, repositories, and images in a single entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the default policy consist of?

A

a single rule that alerts on all images started in the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can rukes define? (3)

A
  1. explicitly allowed trust groups
  2. explicitly denied trust groups
  3. an action to take when an image isn’t trusted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many Trusted Image policies is it possible to configure?

15
Q

How is the Trusted Image policy evaluated?

A

from top down

16
Q

What is the Trusted Image Policy built on?

17
Q

When a matching rule is found, the rule is processed. Are subsequent rules processed?