exam questions

Exam AWS Certified Solutions Architect - Associate SAA-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Associate SAA-C02 exam

Exam AWS Certified Solutions Architect - Associate SAA-C02 topic 1 question 219 discussion

A solutions architect must design a solution that uses Amazon CloudFront with an Amazon S3 origin to store a static website. The company's security policy requires that all website traffic be inspected by AWS WAF.
How should the solutions architect comply with these requirements?

  • A. Configure an S3 bucket policy to accept requests coming from the AWS WAF Amazon Resource Name (ARN) only.
  • B. Configure Amazon CloudFront to forward all incoming requests to AWS WAF before requesting content from the S3 origin.
  • C. Configure a security group that allows Amazon CloudFront IP addresses to access Amazon S3 only. Associate AWS WAF to CloudFront.
  • D. Configure Amazon CloudFront and Amazon S3 to use an origin access identity (OAI) to restrict access to the S3 bucket. Enable AWS WAF on the distribution.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
lunamycat
Highly Voted 3 years, 8 months ago
Answer D. Use an OAI to lockdown CloudFront to S3 origin & enable WAF on CF distribution
upvoted 26 times
studybuddy12
3 years, 7 months ago
why not B?
upvoted 5 times
KALRAV
3 years, 7 months ago
May be because, it is not supported to forward S3 requests to WAF AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, or an AWS AppSync GraphQL API.
upvoted 2 times
...
lehoang15tuoi
3 years, 6 months ago
Because it's impossible to do this: Configure Amazon CloudFront to forward all incoming requests to AWS WAF before requesting content from the S3 origin. The whole sentence makes no sense. Refer this from Amazon: "You can deploy AWS WAF on Amazon CloudFront as part of your CDN solution, the Application Load Balancer that fronts your web servers or origin servers running on EC2, Amazon API Gateway for your REST APIs, or AWS AppSync for your GraphQL APIs. With AWS WAF, you pay only for what you use and the pricing is based on how many rules you deploy and how many web requests your application receives". In any cases, and not just AWS, incoming requests are going to hit the firewall first. If it passes the firewall, then it can continue to its next destination.
upvoted 12 times
induna
3 years, 5 months ago
Thank you, thank you, thank you!
upvoted 1 times
...
...
...
...
Maddy_aws2020
Highly Voted 3 years, 6 months ago
Passed the exam on 19th June 2021. This question appeared in my exam. Marking it for future help
upvoted 15 times
...
AdamSA
Most Recent 1 year, 2 months ago
Option D mentions using an origin access identity (OAI) to restrict access to the S3 bucket, which is a good practice for securing S3 buckets accessed via CloudFront. However, it does not involve AWS WAF inspection of traffic before accessing the origin.
upvoted 1 times
...
Uzbekistan
1 year, 2 months ago
Selected Answer: B
Option D is WRONG ! ! ! It suggests configuring Amazon CloudFront and Amazon S3 to use an origin access identity (OAI) to restrict access to the S3 bucket and enabling AWS WAF on the distribution. While using an OAI with CloudFront is a common practice to restrict direct access to S3 content, it doesn't ensure that all website traffic is inspected by AWS WAF as required by the security policy. Enabling AWS WAF on the CloudFront distribution directly allows for the inspection of incoming requests before they reach the S3 origin. This ensures that all traffic, regardless of its source, is subject to the security policies defined in AWS WAF. Therefore, option B is the more appropriate choice to comply with the security policy.
upvoted 1 times
...
Uzbekistan
1 year, 2 months ago
Selected Answer: B
B. Configure Amazon CloudFront to forward all incoming requests to AWS WAF before requesting content from the S3 origin. By configuring Amazon CloudFront to forward all incoming requests to AWS WAF before fetching content from the S3 origin, you ensure that all website traffic is inspected by AWS WAF as per the security policy requirement. This setup allows AWS WAF to inspect and filter requests based on predefined rulesets before they reach the S3 origin, providing an additional layer of security for the static website hosted on S3.
upvoted 1 times
...
rust7
1 year, 9 months ago
Selected Answer: B
Option D is close to the correct approach, but it misses the fact that you need to inspect traffic with AWS WAF before requesting content from the S3 origin. Enabling AWS WAF after restricting access with an Origin Access Identity (OAI) wouldn't fulfill the requirement of inspecting all incoming website traffic.
upvoted 2 times
...
AmbrishK
2 years, 2 months ago
Selected Answer: B
The correct answer is B. By configuring Amazon CloudFront to forward all incoming requests to AWS WAF before requesting content from the S3 origin, the solution ensures that all traffic to the static website is inspected by AWS WAF, as required by the company's security policy. Option A is not recommended because bucket policies can be complicated to manage and difficult to troubleshoot. Moreover, using an S3 bucket policy to restrict access based on the AWS WAF ARN doesn't ensure that all traffic is inspected by AWS WAF. Option C is not recommended because security groups are not used to restrict access to S3 buckets from Amazon CloudFront, and even if it were used, it doesn't ensure that all traffic is inspected by AWS WAF. Option D is not recommended because using an OAI doesn't provide a way to enforce AWS WAF inspection of traffic to the static website.
upvoted 2 times
...
Ivanyan
3 years, 2 months ago
Selected Answer: D
For sure answer is D
upvoted 2 times
...
yeswanthnarra
3 years, 6 months ago
OAI can't be used with static websites.
upvoted 1 times
...
nickname20212021
3 years, 6 months ago
Passed the exam on 26th June, this question was on my test.
upvoted 9 times
...
syu31svc
3 years, 6 months ago
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-awswaf.html Answer is D
upvoted 7 times
...
Yogi
3 years, 6 months ago
Ans=D. Configure Amazon CloudFront and Amazon S3 to use an origin access identity (OAI) to restrict access to the S3 bucket. Enable AWS WAF on the distribution.
upvoted 3 times
...
e0wynn
3 years, 7 months ago
Changing to D as realized that OAI ensures traffic goes first to Cloudfront and not directly to S3 via resigned URL. Taking 'attach waf to distribution' as includes web traffic monitoring in this case.
upvoted 10 times
...
e0wynn
3 years, 7 months ago
Should be B as question is requesting for http and https to be monitored. OAI is for restricting access to s3 bucket but not for monitoring website traffic.
upvoted 3 times
...
petabread
3 years, 7 months ago
D. Use OAI to restrict direct access to S3 by exposing the content only at the CloudFront layer. Use WAF in front of CloudFront to intercept requests beforehand
upvoted 5 times
...
AWSGeeeeeeK
3 years, 7 months ago
D correct
upvoted 3 times
...
lucho0204
3 years, 7 months ago
Solid D
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...