A security team has a requirement to ensure the environment is scanned for vulnerabilities.
What are three options for configuring vulnerability policies? (Choose three.)
A . individual actions based on package type
B . output verbosity for blocked requests
C . apply policy only when vendor fix is available
D . individual grace periods for each severity level
E . customize message on blocked requests
Answer: ACD
Explanation:
Configuring vulnerability policies within Prisma Cloud involves several options that cater to different
aspects of vulnerability management and policy enforcement.
Options A, C, and D are valid configurations for vulnerability policies:
A) Individual actions based on package type allow for tailored responses to vulnerabilities found in specific types of software packages, enabling more granular control over the remediation process.
C) Applying policies only when a vendor fix is available helps prioritize the remediation of vulnerabilities for which a patch or update has been released by the software vendor, ensuring efficient use of resources in addressing the most actionable security issues.
D) Setting individual grace periods for each severity level allows organizations to define different time frames for addressing vulnerabilities based on their severity, enabling a prioritized and risk-based approach to vulnerability management.
These configurations support a comprehensive vulnerability management strategy by allowing customization and prioritization based on the nature of the vulnerability, the availability of fixes, and the risk level associated with each vulnerability.
Latest PCCSE Dumps Valid Version with 85 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund