Try 12 GIAC Cloud Security Automation (GCSA) sample questions and practice-test preview prompts on infrastructure-as-code scanning, CI/CD gates, secrets management, policy as code, automated remediation, and evidence.
GIAC Cloud Security Automation (GCSA) is a cloud-security automation route for candidates who use infrastructure-as-code, CI/CD controls, policy-as-code, automated evidence, secrets management, and remediation workflows to improve security at scale.
Use this page to preview the kind of automation decisions a GCSA practice route should test. The questions below are original IT Mastery sample questions, not official GIAC exam questions.
Topic: infrastructure-as-code scanning
A team wants to catch public storage buckets before deployment. Where should the control run?
Best answer: C
Explanation: IaC scanning is most useful before misconfigurations reach production. Pull-request and pipeline checks provide early feedback.
Topic: CI/CD gates
A policy gate blocks every deployment when any low-severity warning appears. What is the best improvement?
Best answer: D
Explanation: Gates should be risk-based. Overly broad blocking creates friction and encourages bypasses; tuned gates preserve delivery and control.
Topic: secrets management
A pipeline stores long-lived cloud administrator keys as plain environment variables. What should be changed?
Best answer: A
Explanation: Automation secrets need strong storage, scoped access, rotation, and auditing. Long-lived broad keys create high compromise risk.
Topic: cloud automation
An automated job remediates public security groups by deleting rules immediately. What risk must be considered?
Best answer: B
Explanation: Automated remediation can reduce exposure but must include safeguards. Context, approvals, exceptions, and rollback matter.
Topic: policy as code
What is the main advantage of policy-as-code for cloud security?
Best answer: A
Explanation: Policy-as-code improves consistency and reviewability. It does not replace governance or guarantee perfect security.
Topic: remediation workflow
A posture tool finds unencrypted storage across many accounts. What should automated remediation include?
Best answer: D
Explanation: Remediation should correct risk while preserving accountability and avoiding unnecessary disruption. Verification proves the fix worked.
Topic: identity automation
A script creates cloud roles for new projects. What should be built into the automation?
Best answer: A
Explanation: Identity automation should encode least privilege and governance. It should create reviewable evidence rather than hidden privilege growth.
Topic: container scanning
A build pipeline scans container images but allows deployment even when critical exploitable vulnerabilities are found. What should be improved?
Best answer: B
Explanation: Scanning must influence decisions. Critical exploitable findings should have clear gates, exceptions, and remediation paths.
Topic: drift detection
An engineer manually changes a production cloud resource outside the approved IaC process. Which control helps detect this?
Best answer: A
Explanation: Drift detection identifies configuration changes that diverge from approved state. It supports investigation and reconciliation.
Topic: least privilege
An automation runner deploys one application but has permissions across every cloud account. What is the best correction?
Best answer: D
Explanation: Automation identities should be scoped like human identities. Broad runner privileges can turn a pipeline compromise into cloud-wide compromise.
Topic: incident playbooks
How can automation support cloud incident response?
Best answer: A
Explanation: Response automation should speed repeatable actions while preserving evidence and governance. Destructive automation without approval is risky.
Topic: evidence
Why should automated security workflows store decision evidence?
Best answer: B
Explanation: Evidence makes automated decisions inspectable. It supports governance and helps teams improve rules over time.
| If you miss… | Drill this next |
|---|---|
| pipeline questions | CI/CD gates, severity thresholds, and exceptions |
| IaC questions | scanning, policy-as-code, drift detection, and review workflow |
| secrets questions | vaulting, workload identity, rotation, and auditability |
| remediation questions | owner notification, rollback, evidence, and verification |