exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 163 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 163
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company requires that SSH commands used to access its AWS instance be traceable to the user who executed each command.
How should a Security Engineer accomplish this?

  • A. Allow inbound access on port 22 at the security group attached to the instance. Use AWS Systems Manager Session Manager for shell access to Amazon EC2 instances with the user tag defined. Enable Amazon CloudWatch logging for Systems Manager sessions.
  • B. Use Amazon S3 to securely store one Privacy Enhanced Mail Certificate (PEM file) for each user. Allow Amazon EC2 to read from Amazon S3 and import every user that wants to use SSH to access EC2 instances. Allow inbound access on port 22 at the security group attached to the instance. Install the Amazon CloudWatch agent on the EC2 instance and configure it to ingest audit logs for the instance.
  • C. Deny inbound access on port 22 at the security group attached to the instance. Use AWS Systems Manager Session Manager for shell access to Amazon EC2 instances with the user tag defined. Enable Amazon CloudWatch logging for Systems Manager sessions.
  • D. Use Amazon S3 to securely store one Privacy Enhanced Mail Certificate (PEM file) for each team or group. Allow Amazon EC2 to read from Amazon S3 and import every user that wants to use SSH to access EC2 instance. Allow inbound access on port 22 at the security group attached to the instance. Install the Amazon CloudWatch agent on the EC2 instance and configure it to ingest audit logs for the instances.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JackLee1
Highly Voted 3 years, 9 months ago
Answer C - https://aws.amazon.com/blogs/aws/new-session-manager/
upvoted 35 times
ucsdmiami2020
3 years, 9 months ago
Per @JackLee1's shared AWS referenced URL "Secure Access – You don’t have to manually set up user accounts, passwords, or SSH keys on the instances and you don’t have to open up any inbound ports. Session Manager communicates with the instances via the SSM Agent across an encrypted tunnel that originates on the instance, and does not require a bastion host."
upvoted 5 times
Kdosec
3 years, 8 months ago
But I don't know why must deny SSH access from Security group, it is default deny already ?
upvoted 3 times
fgg89
3 years, 3 months ago
Awesome question. It simply makes no sense, security group rules are ALLOW only. Nevertheless C seems to be the right answer.
upvoted 1 times
...
...
...
...
PeppaPig
Highly Voted 3 years, 9 months ago
C is the best solution. However "Denying inbound access to port 22 in the SG" is annoying, since technically SG has no DENY rule
upvoted 14 times
Hungdv
3 years, 8 months ago
Denying means remove port 22 here.
upvoted 6 times
...
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: C
Correct answer is C.
upvoted 1 times
...
Senthil_SPM
1 year, 9 months ago
Selected Answer: C
Option C. Because, Deny port 22 so that we don't allow direct SSH access. Track all the Allow only through Systems Manager and seamlessly track all the activities
upvoted 1 times
...
addy_prepare
1 year, 10 months ago
C - Looks a very suitable. But what about denying 22 port of SG. As we know we can only ALLOW on SG not DENY.
upvoted 1 times
...
sprial02
1 year, 11 months ago
B is really Correct~ Because EC2 ssh connect using PEM(Priavate Key)
upvoted 1 times
...
Tofu13
2 years, 1 month ago
Selected Answer: B
I think answer C is wrong because 1. Deny inbound access on port 22 at the security group attached to the instance. U cannot actively deny a port with SG, which makes above step impossible. 2. U want to trace your users SSH commands. When u cannot connect via SSH then u won't be able to trace your users via SSH. Session Manager does not use SSH but the SSM agent in order to establish a connection to the instance. Therefore it does not fulfill the requirement of SSH tracing.
upvoted 2 times
...
ITGURU51
2 years, 2 months ago
As per AWS: Session Manager provides secure and auditable node management without the need to open inbound ports, maintain bastion hosts, or manage SSH keys. Session Manager also allows you to comply with corporate policies that require controlled access to managed nodes, strict security practices, and fully auditable logs. It also logs session activity and commands used during the connection.
upvoted 1 times
...
HansD
2 years, 3 months ago
Selected Answer: C
answer C. session manager does not need open ports
upvoted 1 times
...
MungKey
2 years, 10 months ago
A - Not correct, since direct access on ssh port 22 is not logged B- Not correct, since direct accesss on ssh port 22 is not logged by cloud trail C- Correct, by denying direct ssh, users are forced to use session manager and these sessions can be traced D - Not correct
upvoted 2 times
...
Rja148393
2 years, 11 months ago
Selected Answer: C
C since u dont need SSH for shell access using systems manager. And logging is possible since its not a SSH connection and systems manager will have access to the logs.
upvoted 1 times
...
ritears41
2 years, 11 months ago
Selected Answer: C
C is most suitable
upvoted 1 times
...
dcasabona
2 years, 11 months ago
Selected Answer: C
C for sure.
upvoted 1 times
...
xaocho
2 years, 11 months ago
C is simpler
upvoted 1 times
...
sapien45
2 years, 11 months ago
even though SG are allow only I will go for C, as SSM is the cleansed way to provide SSH access and tracing is enabled
upvoted 1 times
...
Timileyin
2 years, 12 months ago
You can not deny in SG. so I am going with B.
upvoted 1 times
...
jackfei
3 years, 1 month ago
C. session manager is suitable for this scenario.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...