exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 134 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 134
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company has enabled Amazon GuardDuty in all Regions as part of its security monitoring strategy. In one of the VPCs, the company hosts an Amazon EC2 instance working as an FTP server that is contacted by a high number of clients from multiple locations. This is identified by GuardDuty as a brute force attack due to the high number of connections that happen every hour.
The finding has been flagged as a false positive. However, GuardDuty keeps raising the issue. A Security Engineer has been asked to improve the signal-to-noise ratio. The Engineer needs to ensure that changes do not compromise the visibility of potential anomalous behavior.
How can the Security Engineer address the issue?

  • A. Disable the FTP rule in GuardDuty in the Region where the FTP server is deployed
  • B. Add the FTP server to a trusted IP list and deploy it to GuardDuty to stop receiving the notifications
  • C. Use GuardDuty filters with auto archiving enabled to close the findings
  • D. Create an AWS Lambda function that closes the finding whenever a new occurrence is reported
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ghostbusters
Highly Voted 3 years, 6 months ago
For those who pointed out B as the answer: Do not think in terms of "can Guard Duty do it this way?" Instead, think: "should this be done?" Because if you ask the 1st q, answer is "yes, GD supports IP whitelisting" and you will be tempted to think B is the answer. If you ask the 2nd q, you will see that doing this will make it impossible to actually identify a real attack on this FTP server. The question warns you against this by saying "changes should not impact visibility of malicious attacks". This question is very typical type where the question designer first thinks of a feature (in this case auto-archiving from filters) and then tries to come up with a question to test that. It reeks of that (well intended but intrinsically flawed) approach
upvoted 45 times
f4bi4n
3 years, 4 months ago
really good approach to tackle this question
upvoted 1 times
...
z0mb133
2 years, 9 months ago
correct. Have my upvote, good sir.
upvoted 2 times
...
munish3420
3 years, 6 months ago
I agree to this and one more point to add FTP is insecure protocol and attackers definitely try to exploit vulnerable protocols. So we cant whitelist FTP . It must be C
upvoted 3 times
...
sapien45
2 years, 8 months ago
Made my switch my answer from B to C
upvoted 3 times
...
...
mvsnogueira
Highly Voted 3 years, 6 months ago
C. "When you create an Amazon GuardDuty filter, you choose specific filter criteria, name the filter and can enable the auto-archiving of findings that the filter matches. This allows you to further tune GuardDuty to your unique environment, without degrading the ability to identify threats. With auto-archive set, all findings are still generated by GuardDuty, so you have a complete and immutable history of all suspicious activity."
upvoted 17 times
AnonymousJhb
3 years, 2 months ago
suppression rules - threats you dont intend on acting on https://docs.aws.amazon.com/guardduty/latest/ug/findings_suppression-rule.html
upvoted 2 times
...
...
Raphaello
Most Recent 1 year, 3 months ago
Selected Answer: C
C Use suppression rule (auto archive) will prevent the finding to show up among the active findings, or populated to SH.
upvoted 2 times
...
ITGURU51
2 years, 1 month ago
If you are receiving findings for expected behavior in your environment, you can automatically archive findings based on criteria you define with suppression rules. Suppression rules are rules which automatically send matched findings to archive. Answer C
upvoted 2 times
...
[Removed]
2 years, 5 months ago
To address the issue of the false positive findings being raised by Amazon GuardDuty, the Security Engineer can use GuardDuty filters with auto archiving enabled to close the findings. This will stop GuardDuty from raising the issue and improve the signal-to-noise ratio. To implement this solution, the Engineer will need to create a filter in GuardDuty that targets the FTP server and any related findings. The filter should be configured to automatically archive the findings when they are reported, so that they are no longer raised as an issue. This will prevent the false positive findings from being raised and improve the overall visibility of potential anomalous behavior.
upvoted 1 times
...
MoreOps
3 years, 3 months ago
Selected Answer: C
I Believe C is the answer, many people here mentioned good reasons for it. you don't want to NOT get the alert at all, you just want to be able to view it later since you know its on by "default", you can put it in an archive and maybe create a rule to specify that if the connections per hour is lets say 150% of the last 48 hours, raise an alert
upvoted 3 times
...
Radhaghosh
3 years, 3 months ago
"The Engineer must verify that modifications do not impair the visibility of potentially unusual activity" --> This line changes the entire approach. Solution mentioned in B will hide any potential positive attack, That is why Answer should be C
upvoted 1 times
...
Cloudvin
3 years, 5 months ago
C https://aws.amazon.com/about-aws/whats-new/2018/05/amazon-guardduty-adds-capability-to-automatically-archive-findings1/
upvoted 2 times
...
khos77
3 years, 6 months ago
I completely agree with ghostbusters comments. You don't want to eliminate the alerts only suppress them. This automatically sends the matched items to archive yet still generates the findings. Just doesn't generate a cloudwatch event... So C hands down is the answer.
upvoted 5 times
hubekpeter
2 years, 5 months ago
Great solution, I don't know what's worse, to not to be notified or to not act on the alert. One way or another it's bad pattern.
upvoted 1 times
...
...
deegadaze1
3 years, 6 months ago
B is the correct Answer:-Trusted IP lists consist of IP addresses that you have trusted for secure communication with your AWS infrastructure and applications. GuardDuty does not generate VPC Flow Log or CloudTrail findings for IP addresses on trusted IP lists. At any given time, you can have only one uploaded trusted IP list per AWS account per Region. Threat lists consist of known malicious IP addresses. GuardDuty generates findings based on threat lists. At any given time, you can have up to six uploaded threat lists per AWS account per Region.
upvoted 2 times
...
Michael679
3 years, 6 months ago
C - Archiving findings could improve the signal-to-noise ratio, but still monitor anomalous behavior.
upvoted 3 times
...
Tron09
3 years, 6 months ago
It can't be "B". Trusted IP list is a list of source IPs. We cannot add the FTP server's IP to that list, doesn't make sense. "C" is the answer.
upvoted 5 times
...
RajeshNayyar
3 years, 6 months ago
answer is C.
upvoted 1 times
...
inf
3 years, 7 months ago
Answer: C Can't be B If you add the server to a whitelist, then it invalidates this statement: "The Engineer needs to ensure that changes do not compromise the visibility of potential anomalous behavior" Need to make sure the FTP server is still being monitored for other malicious activity
upvoted 3 times
...
richasskikr
3 years, 7 months ago
I agree with B. With auto-archive rules, GuardDuty still generates all findings. Suppression rules provide suppression of findings while maintaining a complete and immutable history of all activity. GuardDuty does not generate findings based on trusted IP lists. https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-ug.pdf
upvoted 1 times
[Removed]
3 years, 6 months ago
I disagree, please read the statement in the question "The Engineer needs to ensure that changes do not compromise the visibility of potential anomalous behavior." ... If you set the IP as trusted, GuardDuty will stop notifying you for any potential anomalous behavior, not just for the use case specified in the question. Answer is C.
upvoted 3 times
...
...
inf
3 years, 7 months ago
Answer: C Use a filter, filter on the specific event for that FTP server, then auto-archive Absolutely not B - if added as a trusted IP, what happens when an actual attack happens? No notifications.
upvoted 2 times
...
mychiv
3 years, 7 months ago
C https://aws.amazon.com/about-aws/whats-new/2018/05/amazon-guardduty-adds-capability-to-automatically-archive-findings1/
upvoted 2 times
ucsdmiami2020
3 years, 6 months ago
Per the reference provided by @mychiv "Amazon GuardDuty now allows you to setup automatic archiving when creating a findings filter. This is useful when you have a unique use case in your environment that generates many similar findings, or in situations where you have reviewed a certain class of findings and don’t want to be alerted again."
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago