exam questions

Exam AWS Certified Solutions Architect - Professional SAP-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Professional SAP-C02 exam

Exam AWS Certified Solutions Architect - Professional SAP-C02 topic 1 question 417 discussion

A company has an application that stores data in a single Amazon S3 bucket. The company must keep all data for 1 year. The company’s security team is concerned that an attacker could gain access to the AWS account through leaked long-term credentials.

Which solution will ensure that existing and future objects in the S3 bucket are protected?

  • A. Create a new AWS account that is accessible only to the security team through an assumed role. Create an S3 bucket in the new account. Enable S3 Versioning and S3 Object Lock. Configure a default retention period of 1 year. Set up replication from the existing S3 bucket to the new S3 bucket. Create an S3 Batch Replication job to copy all existing data.
  • B. Use the s3-bucket-versioning-enabled AWS Config managed rule. Configure an automatic remediation action that uses an AWS Lambda function to enable S3 Versioning and MFA Delete on noncompliant resources. Add an S3 Lifecycle rule to delete objects after 1 year.
  • C. Explicitly deny bucket creation from all users and roles except for an AWS Service Catalog launch constraint role. Define a Service Catalog product for the creation of the S3 bucket to force S3 Versioning and MFA Delete to be enabled. Authorize users to launch the product when they need to create an S3 bucket.
  • D. Enable Amazon GuardDuty with the S3 protection feature for the account and the AWS Region. Add an S3 Lifecycle rule to delete objects after 1 year.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nharaz
Highly Voted 1 year, 2 months ago
Selected Answer: A
S3 Object Lock - prevents objects from being deleted or overwritten for a fixed amount of time or indefinitely, adding a layer of protection against malicious or accidental deletion. Replication - to a new account limits the risk of a single point of compromise; even if attackers gain access to the original account, they cannot alter or delete the locked objects in the replicated bucket. Versioning - keeps multiple versions of an object in an S3 bucket, providing additional security and recovery options.
upvoted 8 times
...
career360guru
Highly Voted 1 year, 1 month ago
Selected Answer: D
Option D is the only option that addresses security risk. Option A is not addressing this - Replicating existing bucket to another bucket does not eliminate the risk due to original bucket credential leak.
upvoted 5 times
...
BelloMio
Most Recent 3 weeks, 1 day ago
Selected Answer: B
I will go with B. As option A does not protect the original bucket
upvoted 1 times
...
0b43291
5 months, 2 weeks ago
Selected Answer: A
Option A, the company can effectively isolate sensitive data in a separate, secure account with strict access controls, while ensuring that both existing and future data are protected against unauthorized access, deletion, or modification, even if the original account's credentials are compromised. The other options do not provide the same level of protection or have limitations: Option B relies on AWS Config and automatic remediation, which may not be effective if the attacker gains access to the account and disables or modifies these configurations. Option C focuses on controlling bucket creation but does not address the protection of existing data or objects in the current bucket. Option D relies on Amazon GuardDuty, which is a threat detection service and does not provide the same level of data protection as S3 Versioning and Object Lock.
upvoted 2 times
...
AzureDP900
5 months, 3 weeks ago
The correct answer to this question is Option C. Explicitly denying bucket creation from all users and roles except for an AWS Service Catalog launch constraint role, defining a Service Catalog product for the creation of the S3 bucket, and forcing S3 Versioning and MFA Delete ensures that existing and future objects in the S3 bucket are protected. This option provides explicit access controls for S3 bucket creation and forces S3 versioning and MFA Delete on noncompliant resources, making it the most suitable solution to address the security concerns of the company. Option A is not the best choice because creating a new AWS account can introduce complexity and create a single point of failure. While Options B and D offer some benefits, they do not provide explicit access controls for S3 bucket creation, which is essential for protecting sensitive data.
upvoted 1 times
...
AloraCloud
6 months ago
Eliminate C & D
upvoted 1 times
...
vip2
10 months ago
Selected Answer: A
A assume role to provide short-term credential
upvoted 1 times
...
TonytheTiger
1 year, 1 month ago
Selected Answer: A
Option A: Amazon S3 now allows you to enable S3 Object Lock for existing buckets with just a few clicks and to enable S3 Replication for buckets using S3 Object Lock https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-s3-enabling-object-lock-buckets/#:~:text=To%20lock%20existing%20objects%2C%20you,of%20objects%20at%20a%20time.
upvoted 2 times
...
Dgix
1 year, 1 month ago
Selected Answer: A
The question is, as so often, misleading. None of the alternatives deal with _access_, only with modification.
upvoted 2 times
...
bjexamprep
1 year, 2 months ago
The question is looking for solution for “concerned that an attacker could gain access to the AWS account through leaked long-term credentials”. None of the answer is addressing the concern of “Access” Through “leaked long-term credentials”. The is question doesn’t mention anything about data loss concerns, while, all the answers are providing protection for deleting the data.
upvoted 2 times
9f02c8d
11 months, 1 week ago
creating new account accessed by security team members is action taken to avoid the risk through leaked long-term credentials of existing account so Option A
upvoted 1 times
Daniel76
8 months ago
Attacker can just take the data and leave it intact. The damage is done.
upvoted 1 times
...
...
...
TheCloudGuruu
1 year, 2 months ago
Selected Answer: D
Answer is D. It's the only one that specifically addresses the issue. The question never said only the security team needs access.
upvoted 2 times
07c2d2a
1 year, 2 months ago
The answer is a. It's the only one that prevents the data from being deleted by attackers that get access using long term credential. GuardDuty is a monitoring system. By itself, it doesn't actually stop anything from happening. It also likely wouldn't catch use of existing long-term credentials as malicious.
upvoted 1 times
...
nharaz
1 year, 2 months ago
Enabling GuardDuty with S3 protection and adding a lifecycle rule to delete objects after 1 year focuses on monitoring for threats and managing object lifecycle but: Does not prevent the deletion or alteration of objects by an attacker who has gained access. S3 protection in GuardDuty helps identify suspicious access patterns but after-the-fact rather than preventing unauthorized changes.
upvoted 1 times
...
...
kejam
1 year, 2 months ago
Selected Answer: A
https://repost.aws/knowledge-center/s3-cross-account-replication-object-lock
upvoted 2 times
...
duriselvan
1 year, 2 months ago
A ans : https://docs.aws.amazon.com/AmazonS3/latest/userguide/security-best-practices.html
upvoted 3 times
...
alexis123456
1 year, 2 months ago
Correct Answer is A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago