exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 220 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 220
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company is using AWS Organizations to manage multiple AWS member accounts. All of these accounts have Amazon GuardDuty enabled in all Regions. The company's AWS Security Operations Center has a centralized security account for logging and monitoring. One of the member accounts has received an excessively high bill. A security engineer discovers that a compromised Amazon EC2 instance is being used to mine cryptocurrency. The Security Operations
Center did not receive a GuardDuty finding in the central security account, but there was a GuardDuty finding in the account containing the compromised EC2 instance. The security engineer needs to ensure all GuardDuty findings are available in the security account.
What should the security engineer do to resolve this issue?

  • A. Set up an Amazon CloudWatch Events rule to forward all GuardDuty findings to the security account. Use an AWS Lambda function as a target to raise findings.
  • B. Set up an Amazon CloudWatch Events rule to forward all GuardDuty findings to the security account. Use an AWS Lambda function as a target to raise findings in AWS Security Hub.
  • C. Check that GuardDuty in the security account is able to assume a role in the compromised account using the guardduty;listfindings permission. Schedule an Amazon CloudWatch Events rule and an AWS Lambda function to periodically check for GuardDuty findings.
  • D. Use the aws guardduty get-members AWS CLI command in the security account to see if the account is listed. Send an invitation from GuardDuty in the security account to GuardDuty in the compromised account. Accept the invitation to forward all future GuardDuty findings.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DayQuil
Highly Voted 3 years, 9 months ago
D. Since AWS Organizations is used, then the GuardDuty account in the security account is the "administrative" instance. Member accounts can be invited to join the administrative account to combine findings.
upvoted 17 times
[Removed]
3 years, 9 months ago
according to the question, accounts are already members in the same organization so you don't have to send an invitation https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_accounts.html. : To manage multiple accounts in Amazon GuardDuty, you must choose a single AWS account to be the administrator account for GuardDuty. You can then associate other AWS accounts with the administrator account as member accounts. There are two ways to associate accounts with a GuardDuty administrator account: either through an AWS Organizations organization that both accounts are members of, or by sending an invitation through GuardDuty.
upvoted 8 times
samCarson
2 years ago
The question mentions that the account is a membe of the AWS Org but didn't explicitly mentions that it's already listed as a member of security account (Administrative account). Thus, Security engineer must ensure that an invite is sent and accepted before the findings will be delivered to the central security account.
upvoted 1 times
...
...
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: D
Another question that aims to trick you. The member account does not seem "member to centralized GuardDuty", therefore it needs to be added to centralized GD. The question tries to trick you into thinking that member account is already in centralized GD, but does not send findings. Not sure this kind of questions are legit, cause it is solely based on paying attention to wording. D
upvoted 1 times
...
Green53
2 years ago
Selected Answer: D
Reference: https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_organizations.html If you have already set up a GuardDuty administrator with associated member accounts by invitation, and the member accounts are part of the same organization, their Type changes from by Invitation to via Organizations when you set a GuardDuty delegated administrator for your organization. Which suggests accounts within Organisations don't have to send an invitation, but *do* still need to be added as members: You can enable GuardDuty in the current Region for all organization accounts by choosing enable in the banner at the top of the page. This action also turns on the Auto-Enable feature that enables GuardDuty in any future accounts that you add to your organization. Alternately, you can use the filter field to filter by Relationship status: Not a member, and then choose every account that doesn't have GuardDuty enabled in the current Region. Answer is D
upvoted 1 times
...
ITGURU51
2 years ago
D is the most efficient way to centralize GuardDuty findings.
upvoted 1 times
...
samCarson
2 years ago
Selected Answer: D
Option D suggests using the "aws guardduty get-members" command in the security account to check if the compromised account is listed as a member account. If it is listed, the security engineer can then send an invitation from the security account's GuardDuty to the compromised account's GuardDuty. By accepting the invitation in the compromised account, all future GuardDuty findings from the compromised account will be forwarded to the security account for centralized monitoring. This approach ensures that GuardDuty findings from the compromised account are shared with the security account. It allows the security engineer to detect and monitor any suspicious activities across all member accounts in the centralized security account.
upvoted 1 times
...
pal40sg
2 years, 1 month ago
Selected Answer: B
In this situation, it is important to configure a mechanism to centralize all GuardDuty findings in the security account for effective monitoring and management. Option B provides the appropriate solution by using Amazon CloudWatch Events and an AWS Lambda function to forward all GuardDuty findings to the security account and raise findings in AWS Security Hub.
upvoted 2 times
pal40sg
2 years, 1 month ago
Option D suggests using the AWS CLI command to check the account listing and sending an invitation from GuardDuty in the security account to the compromised account. While this option may establish a connection between the accounts, it does not address the issue of centralizing the findings in the security account.
upvoted 2 times
...
...
robertohyena
2 years, 4 months ago
Selected Answer: A
Answer is A. B- GuardDuty is integrated with Security Hub, there is no need to use CWE and Lambda C-not necessary?! D-not external account. it's a a member account. https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_organizations.html
upvoted 1 times
...
Boss_Sivaji
2 years, 5 months ago
D is the answer. The catch here is the multi-region. Invitation is the only option for multi-region. https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_invitations.html Cross-Regional data transfer may occur when GuardDuty creates member accounts using this method.
upvoted 1 times
...
boooliyooo
2 years, 6 months ago
Selected Answer: D
The correct answer is D. To ensure that all GuardDuty findings are available in the security account, the security engineer should check if the compromised account is listed as a member of the security account using the aws guardduty get-members AWS CLI command. If the compromised account is not listed, the security engineer should send an invitation from GuardDuty in the security account to GuardDuty in the compromised account and accept the invitation to forward all future GuardDuty findings. Option A involves setting up a CloudWatch Events rule and a Lambda function, but this is not sufficient to ensure that all GuardDuty findings are available in the security account.
upvoted 2 times
...
hubekpeter
2 years, 7 months ago
Selected Answer: B
GuardDuty does not manage or retain your logs. All data that GuardDuty consumes is analyzed in near real time and discarded thereafter. This allows GuardDuty to be highly efficient and cost effective, and to reduce the risk of data remanence. For log delivery and retention, you should use AWS logging and monitoring services directly, which provide full-featured delivery and retention options.
upvoted 2 times
...
cloud_collector
2 years, 9 months ago
D should be right. When finished all steps in segment of "Enable GuardDuty in a master account and invite member accounts" .... You have enabled GuardDuty on the member account, and all findings will be forwarded to the master account. You can now monitor the findings about GuardDuty member accounts from the GuardDuty console in the master account. https://aws.amazon.com/blogs/security/how-to-manage-amazon-guardduty-security-findings-across-multiple-accounts/
upvoted 2 times
...
Root_Access
2 years, 10 months ago
Selected Answer: D
GuardDuty doesnt need cloudwatch to aggregate findings, once you add members, admin account can see all the findings, it should be D.
upvoted 3 times
...
dcasabona
2 years, 11 months ago
Selected Answer: D
Option B doesn't make sense to me and option D does...
upvoted 2 times
...
dcasabona
2 years, 11 months ago
Selected Answer: B
I would go for B. Option D would be the correct awsuer if AWS Organizations wasn't in place. Once it is, the invitation process is just for external account. For accounts within the Organization you just need to enable it from the delegated account.
upvoted 3 times
...
sapien45
2 years, 11 months ago
D is the wrong answer. Read carefully : One of the member accounts has incurred an astronomical cost. Meaning that The security engineer does not need to worry about the administrative instance of Guardutty sending invitation to the member account to combine findings. It is no longer his probem. Response E E : The security officer is fired and escorted out of the building.
upvoted 3 times
...
Jonfernz
3 years, 2 months ago
Selected Answer: D
Use the aws guardduty get-members AWS CLI command in the security account to see if the account is listed. Send an invitation from GuardDuty in the security account to GuardDuty in the compromised account. Accept the invitation to forward all future GuardDuty findings.
upvoted 2 times
...
nainakaexam
3 years, 8 months ago
D for sure
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...