The correct answer is D. Automated compliance checks.
Infrastructure as Code (IaC) is a key DevSecOps practice where infrastructure configurations are defined and managed through code. In a security context, the primary benefit of using IaC is the ability to automate compliance checks and enforce security best practices consistently across environments.
Key Benefits of IaC in Security:
Automated Compliance: IaC allows for the embedding of security policies directly into configuration scripts. This means that when infrastructure is deployed, it automatically adheres to compliance requirements (like NIST, CIS benchmarks).
Consistency and Repeatability: Since IaC scripts are version-controlled, any configuration changes are tracked, minimizing the risk of configuration drift.
Security by Design: By coding security configurations (like IAM roles, network ACLs, encryption settings), organizations ensure that every deployment meets security standards.
Reduced Human Error: Automating infrastructure provisioning reduces manual errors that can lead to vulnerabilities.
Why Other Options Are Incorrect:
A. Manual patch management: IaC promotes automated and repeatable configurations, reducing the need for manual patching.
B. Ad hoc security policies: IaC encourages standardized and consistent policies rather than ad hoc management.
C. Static resource allocation: IaC is dynamic and scalable, allowing for automatic scaling and configuration management rather than static resource setups.
Real-World Example:
Using tools like Terraform or AWS CloudFormation, organizations can define IAM policies, security group rules, and data encryption settings as part of the infrastructure code. These configurations are then automatically checked for compliance against established policies during deployment.
Security and Compliance in IaC:
Organizations can integrate tools like Terraform Compliance or AWS Config Rules to automatically verify that infrastructure settings align with regulatory requirements and internal security policies.
[References:, CSA Security Guidance v4.0, Domain 10: Application Security, Cloud Computing Security Risk Assessment (ENISA) - Infrastructure as Code Best Practices, Cloud Controls Matrix (CCM) v3.0.1 - Configuration and Change Management Domain, , ]