exam questions

Exam AWS Certified DevOps Engineer - Professional DOP-C02 All Questions

View all questions & answers for the AWS Certified DevOps Engineer - Professional DOP-C02 exam

Exam AWS Certified DevOps Engineer - Professional DOP-C02 topic 1 question 42 discussion

A company's application development team uses Linux-based Amazon EC2 instances as bastion hosts. Inbound SSH access to the bastion hosts is restricted to specific IP addresses, as defined in the associated security groups. The company's security team wants to receive a notification if the security group rules are modified to allow SSH access from any IP address.
What should a DevOps engineer do to meet this requirement?

  • A. Create an Amazon EventBridge rule with a source of aws.cloudtrail and the event name AuthorizeSecurityGroupIngress. Define an Amazon Simple Notification Service (Amazon SNS) topic as the target.
  • B. Enable Amazon GuardDuty and check the findings for security groups in AWS Security Hub. Configure an Amazon EventBridge rule with a custom pattern that matches GuardDuty events with an output of NON_COMPLIANT. Define an Amazon Simple Notification Service (Amazon SNS) topic as the target.
  • C. Create an AWS Config rule by using the restricted-ssh managed rule to check whether security groups disallow unrestricted incoming SSH traffic. Configure automatic remediation to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic.
  • D. Enable Amazon Inspector. Include the Common Vulnerabilities and Exposures-1.1 rules package to check the security groups that are associated with the bastion hosts. Configure Amazon Inspector to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ixdb
Highly Voted 1 year, 8 months ago
A is right. The Config rule restricted-ssh will not check the ingress rule that use the CIDR other than 0.0.0.0/0 and not notify anyone.
upvoted 18 times
GripZA
2 weeks, 1 day ago
Exactly why it should be C, not A.
upvoted 1 times
GripZA
2 weeks, 1 day ago
Why not A: this could catch changes to security groups, it wouldn't analyze the actual rule content to determine if it's an unrestricted SSH rule (0.0.0.0/0 on port 22).you’d need extra custom logic to parse events and check the CIDR and port range.
upvoted 1 times
...
...
csG13
1 year, 4 months ago
A would send a notification for ANY change in the security group. The question clearly states that wants only when 0.0.0.0/0 is allowed. Therefore, should be C.
upvoted 10 times
hoazgazh
1 year ago
"a notification if the security group rules are modified to allow SSH access from any IP address" from any IP address => so A is correct, any change in SG should send noti
upvoted 1 times
...
...
...
MarDog
Highly Voted 1 year, 10 months ago
Selected Answer: A
I'm going to have to go with A on this one: https://aws.plainenglish.io/detecting-modifications-to-aws-ec2-security-groups-2ef8989a3350 https://repost.aws/knowledge-center/monitor-security-group-changes-ec2
upvoted 8 times
...
teo2157
Most Recent 3 months, 1 week ago
Selected Answer: C
The key point here is "allow SSH access from any IP address" which is exactly "the restricted-ssh managed rule", said that, it's C
upvoted 3 times
...
teo2157
5 months, 1 week ago
Selected Answer: C
Very, very, very hard question. I think the key point here is the ANY, based on that, it's C
upvoted 1 times
...
steli0
5 months, 1 week ago
Selected Answer: C
A would be right if the "ANY" word describing all IPs (0.0.0.0/0) wasn't there. CloudTrail will notify you for any SG rule change.
upvoted 2 times
...
BrusingWayne
5 months, 2 weeks ago
Option C (Incorrect): AWS Config rules are good for ongoing compliance checks, but they don't provide real-time notifications for changes. Config rules run periodically, which could result in a delay between the change and the notification. The automatic remediation aspect is not required in this scenario and could potentially interfere with legitimate changes. Hence, it is Option A.
upvoted 1 times
...
Impromptu
5 months, 2 weeks ago
Selected Answer: C
A: Would send a message to SNS for every change, so not only SSH but all other ports/services. This would be too much. I do get the other comments that C would only notify for 0.0.0.0/0 but I think that is what the question is trying to state with "any IP".
upvoted 3 times
...
anuvindhs
6 months, 4 weeks ago
C is the answer : https://docs.aws.amazon.com/config/latest/developerguide/notifications-for-AWS-Config.html
upvoted 3 times
...
jamesf
9 months ago
Selected Answer: C
keywords: Inbound SSH access C restricted for SSH port (22) only from ANY address
upvoted 3 times
...
shammous
9 months, 1 week ago
A! "AWS Config provides rules such as restricted-ssh that can be used to detect Security Groups that have SSH access open for any IP".
upvoted 1 times
...
TioChico
10 months ago
Selected Answer: A
A is right
upvoted 1 times
...
Sodev
11 months, 2 weeks ago
Selected Answer: A
I think keyword for C must be "ALL". ANY means when new IP is added to security group, so SNS will be triggered
upvoted 2 times
flaacko
8 months, 2 weeks ago
In the context of AWS when you see ANY IP address, it is probably referring to the 0.0.0.0/0 CIDR block which allows traffic from all or any IP address from the internet. When you use the restricteded-ssh managed rule, Security Groups will be labelled as NON_COMPLIANT when they allow unrestricted SSH traffic from anywhere or any IP address (0.0.0.0/0).
upvoted 1 times
...
...
liuyomz
11 months, 3 weeks ago
Selected Answer: C
C makes way more sense from the way AWS wants us to do it
upvoted 2 times
...
seetpt
1 year ago
Selected Answer: C
i vote for c
upvoted 2 times
...
c3518fc
1 year ago
Selected Answer: A
A. This is the correct solution because it leverages Amazon EventBridge to monitor for changes to the security group rules, specifically the AuthorizeSecurityGroupIngress event, which indicates that the security group rules have been modified to allow SSH access from any IP address. By creating an EventBridge rule with the appropriate event pattern and defining an Amazon SNS topic as the target, the DevOps engineer can ensure that the security team receives a notification whenever the security group rules are modified in an undesirable way.
upvoted 2 times
...
zijo
1 year, 1 month ago
Answer is C The restricted-ssh managed rule in AWS Config helps ensure your bastion host security groups are locked down for SSH access. It specifically checks if incoming SSH traffic is accessible for the security groups. The rule is considered COMPLIANT if: SSH access is not open to the public (meaning the rule doesn't find a security group allowing 0.0.0.0/0 for port 22). SSH access is restricted to specific IP addresses or security groups using CIDR notation (e.g., 10.0.0.0/16). If the rule detects a security group allowing SSH access from anywhere (0.0.0.0/0), it triggers a NON_COMPLIANT status.
upvoted 2 times
c3518fc
1 year ago
Yeah, but has nothing to do with anyone changing it. A is your answer because it detects changes and sends out an email notification
upvoted 1 times
...
...
Cervus18
1 year, 1 month ago
Selected Answer: C
restricted-ssh : The rule is COMPLIANT if the IP addresses of the incoming SSH traffic in the security groups are restricted (CIDR other than 0.0.0.0/0 or ::/0). Otherwise, NON_COMPLIANT. https://docs.aws.amazon.com/config/latest/developerguide/restricted-ssh.html That addresses exactly the requirement !
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago