exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 153 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 153
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A recent security audit found that AWS CloudTrail logs are insufficiently protected from tampering and unauthorized access.
Which actions must the Security Engineer take to access these audit findings? (Choose three.)

  • A. Ensure CloudTrail log file validation is turned on.
  • B. Configure an S3 lifecycle rule to periodically archive CloudTrail logs into Glacier for long-term storage.
  • C. Use an S3 bucket with tight access controls that exists in a separate account.
  • D. Use Amazon Inspector to monitor the file integrity of CloudTrail log files.
  • E. Request a certificate through ACM and use a generated certificate private key to encrypt CloudTrail log files.
  • F. Encrypt the CloudTrail log files with server-side encryption AWS KMS-managed keys (SSE-KMS).
Show Suggested Answer Hide Answer
Suggested Answer: ACF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
farziuser
Highly Voted 3 years, 6 months ago
A. Ensure CloudTrail log file validation is turned on. - YES B. Configure an S3 lifecycle rule to periodically archive CloudTrail logs into Glacier for long-term storage. NO - why do you need this here? C. Use an S3 bucket with tight access controls that exists in a separate account. YES - Security best practice. D. Use Amazon Inspector to monitor the file integrity of CloudTrail log files. - NO - not needed. E. Request a certificate through ACM and use a generated certificate private key to encrypt CloudTrail log files. F. Encrypt the CloudTrail log files with server-side encryption AWS KMS-managed keys (SSE-KMS). - YES
upvoted 33 times
dfranco76
3 years, 5 months ago
Probably I'm wrong but i guess it is B, C and F. Why do i change answer "A" with "B" . The question is: "CloudTrail records are not adequately safeguarded against manipulation and unauthorized access" . I guess that "CloudTrail log file validation is" cant avoid log to be manipulated. It will advise that there was tampering but it cant avoid it by itself. Instead sending the logs to a Glacier, customer can safety store them avoiding manipulation. If I'm wrong, please don't let me live in the dark... :)
upvoted 1 times
dfranco76
3 years, 5 months ago
Please be careful, because in other bank of questions i found the same question but just changing one word: " to have access to these audit findings" with "to have address to these audit findings" obviously it changes significantly the meaning. Ciao
upvoted 2 times
dfranco76
3 years, 5 months ago
In other words if it is : - " to have access to these audit findings" : Correct answer : A, C & F. - " to have address to these audit findings" : Correct answer : B, C & F.
upvoted 2 times
dfranco76
3 years, 5 months ago
Sincerely I guess that question is wrong, looking at the answer it fits better with " to have address to these audit findings" than with " to have access to these audit findings". Sorry I don't disturb more
upvoted 2 times
...
...
...
...
KRtoptech
1 year, 8 months ago
C - is actually over thinking
upvoted 1 times
...
...
PeppaPig
Highly Voted 3 years, 7 months ago
AC&F are answers
upvoted 10 times
...
Raphaello
Most Recent 1 year, 2 months ago
Selected Answer: ACF
ACF are the correct answers
upvoted 2 times
...
ITGURU51
2 years ago
AWS best practices to protect CloudTrail logs: 1)Enable CloudTrail log file integrity 2)Log to a dedicated and centralized Amazon S3 bucket 3) Use server-side encryption with AWS KMS managed keys (SSE-KMS) ACF
upvoted 1 times
...
TechX
2 years, 8 months ago
Selected Answer: ACF
Answer: ACF Explanation: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
upvoted 1 times
...
sapien45
2 years, 9 months ago
Selected Answer: ACF
ACF, AWS ControlTower do all thoses steps for you
upvoted 3 times
...
MoreOps
3 years ago
Selected Answer: ACF
I would go with ACF
upvoted 1 times
...
lotfi50
3 years, 2 months ago
Selected Answer: ACF
the answer is A, C & F
upvoted 1 times
...
Radhaghosh
3 years, 3 months ago
A, C, F
upvoted 1 times
...
kiev
3 years, 6 months ago
ACF for me too
upvoted 1 times
...
nhokicuc
3 years, 6 months ago
A, C & F
upvoted 2 times
...
skipbaylessfor3
3 years, 6 months ago
Yeah A C F seems correct. Curious as to why E couldn't be correct though... It seems like a very strange solution but technically possible. I guess F is a just more common way of doing it
upvoted 2 times
...
deegadaze1
3 years, 7 months ago
ACF Correct !
upvoted 2 times
deegadaze1
3 years, 6 months ago
Apologies ABF is the correct answer. no need for User access control with S3
upvoted 1 times
...
...
freddyman
3 years, 7 months ago
A, C F. B is not relevant to security which is what the question asks. B is good practice not not relevant, also delete logs outside the retention period to reduce costs.
upvoted 3 times
...
Awraith
3 years, 7 months ago
A, C, F
upvoted 1 times
...
Tester3
3 years, 7 months ago
A, C, F
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago