Problem 1: Why is it important to use an unprivileged user for your container? What kind of attacks can be prevented by using this method?
Problem 2: Explain how to implement Encryption at Rest and Encryption in Transit for a database.
Problem 3: Describe any two security challenges introduced by Containerization
Problem 4: What is the Shared Responsibility Model? How does the model vary with different Cloud Service Models?
Problem 5: Describe how you would leverage a cloud service provider network to mitigate against DDoS.