exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 15 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 15
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A Security Engineer must design a solution that enables the incident Response team to audit for changes to a user's IAM permissions in the case of a security incident.
How can this be accomplished?

  • A. Use AWS Config to review the IAM policy assigned to users before and after the incident.
  • B. Run the GenerateCredentialReport via the AWS CLI, and copy the output to Amazon S3 daily for auditing purposes.
  • C. Copy AWS CloudFormation templates to S3, and audit for changes from the template.
  • D. Use Amazon EC2 Systems Manager to deploy images, and review AWS CloudTrail logs for changes.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
josellama2000
Highly Voted 3 years, 7 months ago
Agreed. Answer is A. However, this will require the admin to first create an AWS config rule to record the IAM use changes. AWS config will not record those changes by default. https://aws.amazon.com/blogs/security/how-to-record-and-govern-your-iam-resource-configurations-using-aws-config/
upvoted 33 times
JG8888
2 years, 11 months ago
Answer A seems the right one, but Is that comment right? In the link you passed and in the documentation says that Config records all configuration changes by default on IAM. So I don't think it is needed to add a rule to get this data.
upvoted 2 times
...
...
cloudguy365
Highly Voted 3 years, 7 months ago
A is the right answer.
upvoted 13 times
...
0x00infosec
Most Recent 7 months ago
Answer is A
upvoted 1 times
...
Benah
1 year, 7 months ago
A is correct Use AWS Config to review the IAM policy assigned to users before and after the incident.
upvoted 1 times
...
Leem29
1 year, 11 months ago
agreed A
upvoted 1 times
...
matrpro
2 years ago
Selected Answer: A
here are 2 points that make B wrong: 1 GenerateCredentialReport , is related to passwords and not about roles and policies as requested https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html . 2. They want to check the incident only when there is a problem and in B you are taking action every week.
upvoted 2 times
...
yd_h
2 years ago
Selected Answer: A
couldn't find any field relating to the IAM permission changes in credentials reports (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html#id_credentials_understanding_the_report_format)
upvoted 1 times
...
AWS_Noob
2 years, 2 months ago
Selected Answer: A
I'm going with A, because of the statement "in case of a security event". When using B, you'll end up filling storage with logs and only when something happens, will you need to review. It's not asking for continuous logging but rather a way to audit logs "When" something happens. B works , just not for the scenario they're painting
upvoted 1 times
...
IlMettics
2 years, 3 months ago
Selected Answer: B
I think that A and B is correct, B is because running the GenerateCredentialReport via the AWS CLI, and copying the output to Amazon S3 daily for auditing purposes, allows the incident response team to view a user's IAM permissions over time. This can help identify changes that were made that could be related to the incident. Additionally, by copying the report to Amazon S3, the incident response team will have a secure and durable storage location for the audit logs and it's important to note that AWS Config and CloudTrail logs can also be used to view changes in IAM policies, but the Credential Report provides a more detailed and user-centric view of IAM permissions, which can be useful in incident investigations.
upvoted 1 times
matrpro
2 years ago
Hello. In my opinion, B is wrong. There are 2 points that make it wrong: 1 GenerateCredentialReport , is related to passwords and not about roles and policies as requested https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html . 2. They want to check the incident only when there is a problem and in B you are taking actions every week.
upvoted 1 times
...
...
Mr__
2 years, 7 months ago
Selected Answer: A
A is right
upvoted 1 times
...
RaySmith
3 years, 2 months ago
A is correct
upvoted 1 times
...
lotfi50
3 years, 3 months ago
Selected Answer: A
A is correct
upvoted 1 times
...
jj22222
3 years, 3 months ago
a is right
upvoted 1 times
...
jj22222
3 years, 4 months ago
A looks right
upvoted 1 times
...
sanjaym
3 years, 5 months ago
Ans: A 100%
upvoted 2 times
...
nasreenazad57
3 years, 6 months ago
A is correct - AWS config
upvoted 2 times
...
devjava
3 years, 6 months ago
Ans > A
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago