exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 197 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 197
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company wants to deploy a distributed web application on a fleet of EC2 instances. The fleet will be fronted by a Classic Load Balancer that will be configured to terminate the TLS connection. The company wants to make sure that all past and current TLS traffic to the Classic Load Balancer stays secure, even if the certificate private key is leaked.
To ensure the company meets these requirements, a Security Engineer can configure a Classic Load Balancer with:

  • A. An HTTPS listener that uses a certificate that is managed by Amazon Certification Manager.
  • B. An HTTPS listener that uses a custom security policy that allows only perfect forward secrecy cipher suites.
  • C. An HTTPS listener that uses the latest AWS predefined ELBSecurityPolicy-TLS-1-2-2017-01 security policy.
  • D. A TCP listener that uses a custom security policy that allows only perfect forward secrecy cipher suites.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JAWS1600
Highly Voted 3 years, 8 months ago
B . https://www.thesslstore.com/blog/perfect-forward-secrecy-explained/#:~:text=Perfect%20forward%20secrecy%20is%20a,freshly%20generated%20frequently%20and%20automatically.
upvoted 20 times
...
jefro
Highly Voted 3 years, 6 months ago
I would lean towards B as the answer as it indicates that only ciphers that support PFS are used which matches requirements listed in the question. Option C includes support for non-PFS ciphers for backward compatibility browsers that do not support ECDHE ciphers https://docs.amazonaws.cn/en_us/elasticloadbalancing/latest/classic/elb-security-policy-table.html
upvoted 6 times
Radhaghosh
3 years, 3 months ago
Did you read this line? You can choose one of the predefined security policies for your HTTPS/SSL listeners. We recommend the default predefined security policy, ELBSecurityPolicy-2016-08, for compatibility. You can use one of the ELBSecurityPolicy-TLS policies to meet compliance and security standards that require disabling certain TLS protocol versions. Predefined security policies The following are the predefined security policies for Classic Load Balancers. To describe a predefined policy, use the describe-load-balancer-policies command. ELBSecurityPolicy-2016-08 ELBSecurityPolicy-TLS-1-2-2017-01 ELBSecurityPolicy-TLS-1-1-2017-01
upvoted 3 times
...
...
Raphaello
Most Recent 1 year, 2 months ago
Selected Answer: B
B is better than C, cause TLS-1-2-2017-01 includes other ciphers beside ECDHE, like AES256-SHA256 (which are not PFS) So to strictly allow only PFS ciphers, use custom security policy with only ECDHE ciphers.
upvoted 1 times
...
yorkicurke
1 year, 4 months ago
Selected Answer: B
... old answer is B new ONe: C [if ELBSecurityPolicy-TLS13-1-2-2021-06 and above] ... AWS provides several predefined security policies for HTTPS listeners that support Perfect Forward Secrecy (PFS). Here are some of them: ELBSecurityPolicy-FS-1-2-2019-08 ELBSecurityPolicy-FS-1-2-Res-2020-10 ELBSecurityPolicy-TLS13-1-2-2021-06 ELBSecurityPolicy-TLS13-1-3-2021-06 ELBSecurityPolicy-TLS13-1-2-Res-2021-06
upvoted 1 times
...
gsax
1 year, 9 months ago
Selected Answer: C
Predefined are preferred. No reason to discard C.
upvoted 1 times
...
ITGURU51
2 years, 1 month ago
Since privacy protection is becoming increasingly important, we have added support for Perfect Forward Secrecy. This security feature uses a derived session key to provide additional safeguards against the eavesdropping of encrypted data. This prevents the decoding of captured data, even if the secret long-term key is compromised. B
upvoted 1 times
...
awsguru1998
2 years, 2 months ago
D...using an HTTPS listener alone would not ensure that past and current TLS traffic to the Classic Load Balancer stays secure in the event of a private key leak. In this case, option D, which suggests using a TCP listener with a custom security policy that allows only perfect forward secrecy (PFS) cipher suites, would be the better option to ensure the confidentiality of past and current TLS traffic. PFS ensures that each session uses a unique session key that is not derived from the long-term private key. Therefore, even if an attacker gains access to the private key, they will not be able to decrypt past traffic.
upvoted 1 times
...
awssazure
2 years, 8 months ago
Selected Answer: B
B is good enough
upvoted 1 times
...
sapien45
2 years, 10 months ago
Selected Answer: B
As per documention, I would lean towards B .... but who is still using CLB .... https://aws.amazon.com/blogs/aws/elastic-load-balancing-perfect-forward-secrecy-and-other-security-enhancements/ Perfect forward secrecy is a feature of SSL/TLS that prevents an attacker from being able to decrypt the data from historical or future sessions if they’re able to steal the private keys used in a particular session. This is achieved by using unique session keys that are freshly generated frequently and automatically.
upvoted 3 times
...
trongod05
2 years, 11 months ago
Selected Answer: B
Answer is B. You need to choose a cipher suite that supports only PFS to prevent private key leakage and disable the ciphers that don't. https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-security-policy-table.html. The key is in the first paragraph of the support documentation is "Alternatively, you can create a custom security policy."
upvoted 1 times
...
mx677
3 years, 2 months ago
Selected Answer: B
ELBSecurityPolicy-TLS-1-2-2017-01 only supports tls 1.2
upvoted 1 times
...
alghoundar
3 years, 3 months ago
for me the answer is C . first aws always leans towards using aws managed and predefined services. second ECDHE ( E stands for ephemeral hint hint for PFS) supports PFS third the predefined policy 1-2-2017-1 supports ECDHE in the cipher suite.
upvoted 2 times
...
Radhaghosh
3 years, 3 months ago
Answer is C You can choose one of the predefined security policies for your HTTPS/SSL listeners. We recommend the default predefined security policy, ELBSecurityPolicy-2016-08, for compatibility. You can use one of the ELBSecurityPolicy-TLS policies to meet compliance and security standards that require disabling certain TLS protocol versions. Predefined security policies The following are the predefined security policies for Classic Load Balancers. To describe a predefined policy, use the describe-load-balancer-policies command. ELBSecurityPolicy-2016-08 ELBSecurityPolicy-TLS-1-2-2017-01 ELBSecurityPolicy-TLS-1-1-2017-01 https://docs.amazonaws.cn/en_us/elasticloadbalancing/latest/classic/elb-security-policy-table.html
upvoted 1 times
...
HananS
3 years, 6 months ago
B is the answer https://aws.amazon.com/blogs/aws/elastic-load-balancing-perfect-forward-secrecy-and-other-security-enhancements/
upvoted 2 times
...
Syeda123
3 years, 6 months ago
Answer is C or B; I am confused..
upvoted 1 times
EricR17
3 years, 6 months ago
The answer is B. This is a tricky question as it requires you to research what ELBSecurityPolicy-TLS-1-2-2017-01 actually supports. Looking at the table on this page: https://docs.amazonaws.cn/en_us/elasticloadbalancing/latest/classic/elb-security-policy-table.html You can see that ciphers like AES128-GCM-SHA256 are supported. That's not a PFS cipher.
upvoted 3 times
...
...
Hungdv
3 years, 7 months ago
Answer is D: "custom security policy" has to use TCP
upvoted 1 times
Hungdv
3 years, 7 months ago
I am mistake. Answer is B: https://aws.amazon.com/blogs/aws/elastic-load-balancing-perfect-forward-secrecy-and-other-security-enhancements/
upvoted 1 times
Hungdv
3 years, 7 months ago
Typo: C
upvoted 1 times
...
...
...
[Removed]
3 years, 7 months ago
C: https://docs.amazonaws.cn/en_us/elasticloadbalancing/latest/classic/elb-security-policy-table.html
upvoted 3 times
Daniel76
3 years, 7 months ago
This source does not mention the required Perfect Forward Secrecy feature that is needed. To use PFS feature, you just need to ensure cipher suite used is ECDHE. Using ELBSecurityPolicy-TLS-1-2-2017-01 does not ensure the ticks are on the needed cipher suite in the table.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...