exam questions

Exam AWS Certified Developer - Associate DVA-C02 All Questions

View all questions & answers for the AWS Certified Developer - Associate DVA-C02 exam

Exam AWS Certified Developer - Associate DVA-C02 topic 1 question 147 discussion

A developer is building an application that gives users the ability to view bank accounts from multiple sources in a single dashboard. The developer has automated the process to retrieve API credentials for these sources. The process invokes an AWS Lambda function that is associated with an AWS CloudFormation custom resource.

The developer wants a solution that will store the API credentials with minimal operational overhead.

Which solution will meet these requirements in the MOST secure way?

  • A. Add an AWS Secrets Manager GenerateSecretString resource to the CloudFormation template. Set the value to reference new credentials for the CloudFormation resource.
  • B. Use the AWS SDK ssm:PutParameter operation in the Lambda function from the existing custom resource to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set the parameter type to SecureString.
  • C. Add an AWS Systems Manager Parameter Store resource to the CloudFormation template. Set the CloudFormation resource value to reference the new credentials. Set the resource NoEcho attribute to true.
  • D. Use the AWS SDK ssm:PutParameter operation in the Lambda function from the existing custom resource to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set the parameter NoEcho attribute to true.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Jing2023
Highly Voted 1 year, 6 months ago
Answer is B A is not correct as the requirement asked to store API credentials, GenerateSecretString will create a random string as password. C the API credential will be retrieved by the Lambda function, it is un-available to the template. D no echo is a attribute of cloud formation template.
upvoted 17 times
...
Digo30sp
Highly Voted 1 year, 7 months ago
Selected Answer: D
The correct answer is (D). Solution (D) is the most secure because it stores the API credentials in AWS Secrets Manager, which is a managed service that provides secure, policy-controlled storage for secrets. The parameter's NoEcho attribute prevents the parameter value from being displayed in the console or request history.
upvoted 7 times
...
ShakthiGCP
Most Recent 6 months ago
Selected Answer: B
SecureString parameters are encrypted both when stored in the Parameter Store (at rest) and while being transmitted (in transit) using AWS KMS (Key Management Service). This means that even if someone were to gain unauthorized access to the Parameter Store's underlying storage, they wouldn't be able to easily read the parameter's value.
upvoted 1 times
...
Anandesh
9 months, 3 weeks ago
Selected Answer: D
https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_PutParameter.html
upvoted 1 times
...
65703c1
11 months, 2 weeks ago
Selected Answer: B
B is the correct answer.
upvoted 1 times
...
Melisa202401
1 year ago
Selected Answer: C
I choose C, not choose A due to minimal cost I dont understand why most of you choose B
upvoted 2 times
ShakthiGCP
6 months ago
NoEcho is not very secure compared to SecureString which encrypts the sensitive data at rest and transit.
upvoted 1 times
...
...
KarBiswa
1 year, 1 month ago
its B only https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html#:~:text=You%20can%20also%20use%20SecureString%20parameters%20with%20other%20AWS%20services.%20In%20the%20following%20example%2C%20the%20Lambda%20function%20retrieves%20a%20SecureString%20parameter%20by%20using%20the%20GetParameters%20API.
upvoted 2 times
...
KarBiswa
1 year, 2 months ago
Selected Answer: A
I will got with A. Becausehttps://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/parameters-section-structure.html nullifying the B&D. Justifying A https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/dynamic-references.html
upvoted 1 times
KarBiswa
1 year, 1 month ago
Reverting the Option to B
upvoted 1 times
...
...
KillThemWithKindness
1 year, 2 months ago
Selected Answer: B
The solution that will meet the requirements is to use the AWS SDK ssm PutParameter operation in the Lambda function from the existing custom resource to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set the parameter type to SecureString. This way, the developer can store the API credentials with minimal operational overhead, as AWS Systems Manager Parameter Store provides secure and scalable storage for configuration data. The SecureString parameter type encrypts the parameter value with AWS Key Management Service (AWS KMS). The other options either involve adding additional resources to the CloudFormation template, which increases complexity and cost, or do not encrypt the parameter value, which reduces security.
upvoted 2 times
...
SerialiDr
1 year, 3 months ago
Selected Answer: B
B. Use the AWS SDK ssm:PutParameter operation in the Lambda function from the existing custom resource to store the credentials as a parameter. Set the parameter value to reference the new credentials. Set the parameter type to SecureString: This is a secure and operationally efficient solution. AWS Systems Manager Parameter Store can securely store parameters as SecureString, which encrypts the parameter value. The ssm:PutParameter operation can be used within the Lambda function to store the credentials directly after retrieval, minimizing operational overhead.
upvoted 1 times
...
Snape
1 year, 3 months ago
Selected Answer: B
Answer is B
upvoted 1 times
...
rrshah83
1 year, 4 months ago
Selected Answer: B
noecho is CF feature, not ssm param store
upvoted 1 times
...
Certified101
1 year, 4 months ago
Selected Answer: B
Agree with B - D will be stored in plain text, this is credentials so should be secure string
upvoted 2 times
...
kaes
1 year, 5 months ago
Selected Answer: D
ANS: D NoEcho https://github.com/aws-cloudformation/cloudformation-coverage-roadmap/issues/82#issuecomment-517704282
upvoted 3 times
...
kaes
1 year, 5 months ago
ANS: D NoEcho https://github.com/aws-cloudformation/cloudformation-coverage-roadmap/issues/82#issuecomment-517704282
upvoted 1 times
...
ut18
1 year, 6 months ago
Is B the correct answer? SecureString isn't currently supported for AWS CloudFormation templates. https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_PutParameter.html
upvoted 2 times
...
Bolu_Jay
1 year, 6 months ago
Answer is A AWS Secrets Manager is specifically designed for securely storing sensitive information like API credentials, database passwords, and other secrets
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago