A security team is tasked with creating an image assessment policy in the Falcon Cloud to scan container images for vulnerabilities before deployment. Which of the following configurations is required to ensure the policy works as intended?
When analyzing cloud findings for misconfigurations, which of the following would be considered a high-risk practice that should be flagged for remediation?