exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 137 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 137
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company has an encrypted Amazon S3 bucket. An Application Developer has an IAM policy that allows access to the S3 bucket, but the Application Developer is unable to access objects within the bucket.
What is a possible cause of the issue?

  • A. The S3 ACL for the S3 bucket fails to explicitly grant access to the Application Developer
  • B. The AWS KMS key for the S3 bucket fails to list the Application Developer as an administrator
  • C. The S3 bucket policy fails to explicitly grant access to the Application Developer
  • D. The S3 bucket policy explicitly denies access to the Application Developer
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
awssecuritynewbie
Highly Voted 3 years, 9 months ago
D is what i thought if the IAM is allowing the users the buckets policy is not needed but if the bucket policy is denying access no matter if the IAM user policy grants it
upvoted 22 times
...
joeboy
Highly Voted 3 years, 9 months ago
Answer: D
upvoted 8 times
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: D
Resource policy comes BEFORE identity policy when evaluating, and an explicit deny overrule an allow. D..ofc.
upvoted 1 times
...
RosenYordanov
1 year, 8 months ago
Selected Answer: D
D. The S3 bucket policy explicitly denies access to the Application Developer. If the S3 bucket policy explicitly denies access to the Application Developer, this would certainly cause the issue. S3 bucket policies can include "Deny" statements that override "Allow" statements in IAM policies. The most likely cause of the issue is option D. The S3 bucket policy explicitly denying access to the Application Developer would result in the behavior described. You should check the S3 bucket policy to ensure that it does not contain any explicit "Deny" statements for the Application Developer.
upvoted 1 times
...
Senthil_SPM
1 year, 9 months ago
Selected Answer: C
Option "D" says explicitly denies which means, the particular user has to be denied. But that is not the case here. So, option "C" is the right answer because due to other reasons (like not granted) he might have got blocked
upvoted 1 times
...
addy_prepare
1 year, 10 months ago
Selected Answer: D
https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html
upvoted 1 times
...
Green53
2 years ago
Selected Answer: D
I'd go with D. If the IAM policy has an allow, only an *explicit* deny would stop the user from accessing the bucket. Yes, it could be a problem with the key, but "list the application developer as an administrator" isn't required to use the key itself.
upvoted 2 times
...
OCHT
2 years ago
Selected Answer: B
To explain, when you use server-side encryption with AWS Key Management Service (SSE-KMS) for an S3 bucket, not only does the IAM policy need to allow access to the S3 bucket, but the key policy for the KMS key used for encryption also needs to allow the necessary permissions. In other words, if the Application Developer doesn't have the necessary permissions in the KMS key policy to use the key (like kms:Decrypt for reading objects, for example), they would be unable to access the objects in the bucket, even if their IAM policy allows S3 bucket access. Of course, without more specific details, this is just one possible cause. There could be other potential issues too (like explicit deny statements, lack of necessary S3 permissions in the IAM policy, etc.), but based on the information in the question, Option B seems the most likely.
upvoted 2 times
...
ITGURU51
2 years, 2 months ago
The IAM role has been configured to allow access to the S3 resource. However the bucket has an explicit deny policy which takes precedence over the allow rule.
upvoted 2 times
...
Laziiie
2 years, 7 months ago
Why is c not answer?
upvoted 1 times
landsamboni
2 years, 7 months ago
I think it is C
upvoted 1 times
...
AshishFL
2 years, 4 months ago
IAM policy grants access, so explicit grant from bucket policy is not needed. Option D explicitly denies access, so the IAM policy is overridden.
upvoted 1 times
...
...
sapien45
2 years, 10 months ago
Selected Answer: D
https://aws.amazon.com/blogs/security/how-to-restrict-amazon-s3-bucket-access-to-a-specific-iam-role/
upvoted 1 times
...
lotfi50
3 years, 1 month ago
Selected Answer: D
Answer: D
upvoted 1 times
...
1awssec
3 years, 8 months ago
D is blocking, though IAM policy allowing as stated in the question
upvoted 1 times
...
nhokicuc
3 years, 8 months ago
I will go with D,E
upvoted 1 times
...
vmalj
3 years, 8 months ago
Ans is D Reason: You don't need to explicitly grant permission to user in S3 Policy if he\she has permission in IAM, except when the S3 policy has explicit DENY
upvoted 1 times
...
skipbaylessfor3
3 years, 8 months ago
It mentions the bucket is encrypted. It could have to do with something with KMS etc too right? Like, maybe the user doesn't have kms:Decrypt permissions? Or am I wrong here
upvoted 3 times
hubekpeter
2 years, 7 months ago
The AWS KMS key for the S3 bucket fails to list the Application Developer as an administrator - because it's nonsense and on the other hand you'll get a different error, not access deny.
upvoted 2 times
...
...
sanjaym
3 years, 8 months ago
I'll go with D
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...