exam questions

Exam AWS DevOps Engineer Professional All Questions

View all questions & answers for the AWS DevOps Engineer Professional exam

Exam AWS DevOps Engineer Professional topic 1 question 62 discussion

Exam question from Amazon's AWS DevOps Engineer Professional
Question #: 62
Topic #: 1
[All AWS DevOps Engineer Professional Questions]

A company gives its employees limited rights to AWS. DevOps engineers have the ability to assume an administrator role. For tracking purposes, the security team wants to receive a near-real-time notification when the administrator role is assumed.
How should this be accomplished?

  • A. Configure AWS Config to publish logs to an Amazon S3 bucket. Use Amazon Athena to query the logs and send a notification to the security team when the administrator role is assumed.
  • B. Configure Amazon GuardDuty to monitor when the administrator role is assumed and send a notification to the security team.
  • C. Create an Amazon EventBridge (Amazon CloudWatch Events) event rule using an AWS Management Console sign-in events event pattern that publishes a message to an Amazon SNS topic if the administrator role is assumed.
  • D. Create an Amazon EventBridge (Amazon CloudWatch Events) events rule using an AWS API call that uses an AWS CloudTrail event pattern to trigger an AWS Lambda function that publishes a message to an Amazon SNS topic if the administrator role is assumed.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
D2
Highly Voted 3 years, 7 months ago
D should be right answer as it covers all methods of assuming admin role - not just management console
upvoted 19 times
StelSen
3 years, 7 months ago
This is the most convincing answer. Thanks D2
upvoted 1 times
...
...
LB
Highly Voted 3 years, 7 months ago
D is the answer here
upvoted 13 times
justfmm
3 years, 6 months ago
Why is D the answer ? CloudTrail takes up to 15mins whereby question ask for near real time.
upvoted 3 times
saggy4
2 years, 4 months ago
The questions says Near Real time and not real time
upvoted 2 times
...
...
...
DevOpsJagadGuru
Most Recent 2 years, 2 months ago
Selected Answer: D
The correct answer is option D. Explanation: To track the assumption of an AWS administrator role in near real-time, you can use Amazon CloudWatch Events and AWS CloudTrail. Amazon CloudWatch Events allows you to create rules that can match incoming events and take action on them. You can use an AWS CloudTrail event pattern to match the event where the administrator role is assumed. When an event rule matches an incoming event, it triggers an AWS Lambda function. You can configure the Lambda function to publish a message to an Amazon SNS topic that notifies the security team. Therefore, option D is the correct answer as it provides a near-real-time notification to the security team when the administrator role is assumed by using Amazon EventBridge (CloudWatch Events) events rule, AWS CloudTrail event pattern, AWS Lambda function, and Amazon SNS.
upvoted 1 times
...
Sabreen_Salama
2 years, 2 months ago
I think it is D
upvoted 1 times
...
Piccaso
2 years, 3 months ago
Selected Answer: C
D must be doable. C is much easier.
upvoted 1 times
...
damians106
2 years, 3 months ago
Selected Answer: D
D is the asnwer. Example: "detail": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "XYZZYOR:admin", "arn": "arn:aws:sts::123456789012:role/admin", "accountId": "123456789012", "accessKeyId": "XYZZY", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "XYZZYOR", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2022-02-17T09:41:02Z", "mfaAuthenticated": "false" } } },
upvoted 3 times
...
Bulti
2 years, 3 months ago
Answer is D. Based on the article below, assuming Role using STS ( IAM switchRole feature) is not considered as one of the AWS Console Sign-in events. Only direct sign-in using root and IAM user along with federated sign-in using AWS SSO are considered to be AWS Console Sign-in events. But once you sign in, any role switching performed to login as an administrator in the master account is not considered a sign-in event. Also as it's possible to Assume role using STS: AssumeRole or AssumeRoleWithSAML API and therefore such events will not be logged in as Console Sign-in events even if my above explanation of Console Sign-in events is not accurate. As a result the correct answer is D.
upvoted 4 times
Bulti
2 years, 3 months ago
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-aws-console-sign-in-events.html
upvoted 1 times
...
...
nnope
2 years, 4 months ago
Selected Answer: D
CloudTrail is near real time
upvoted 1 times
...
Arkarter
2 years, 4 months ago
Selected Answer: D
REF : https://aws.amazon.com/blogs/mt/monitor-and-notify-on-aws-account-root-user-activity/
upvoted 1 times
...
SatenderRathee
2 years, 5 months ago
Selected Answer: D
Cloud trail - 'NEAR' real time is the key word
upvoted 1 times
...
bartekb3d
2 years, 5 months ago
Selected Answer: C
C is right answer.
upvoted 2 times
...
flavins
2 years, 5 months ago
Selected Answer: D
I go for D Since Cloudtrail deals with taking note of who or what accesses any API(in this instance login and assume roles API)
upvoted 1 times
...
keigan
2 years, 6 months ago
D https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_apis
upvoted 1 times
...
RightAnswers
2 years, 7 months ago
Selected Answer: D
The requirement is to track whenever the DevOps engineer assumes Admin role (not the console sign-in events as mentioned in answer C). CloudTrail logs attempts to sign into the AWS Management Console (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-aws-console-sign-in-events.html). CloudTrail can be configured to send events to CloudWatch Logs, and CloudWatch sends an SNS notification. The requirement is for a NEAR real time - unfortunately CloudTrail typically delivers logs within an average of about 15 minutes of an API call. This time is not guaranteed.
upvoted 3 times
...
hubekpeter
2 years, 8 months ago
Selected Answer: C
You can use sns topic as an event bridge target. There’s no need to put lambda in between. This solution is easier to implement, cheaper and more straight forward.
upvoted 1 times
...
adebisiayo
2 years, 9 months ago
Selected Answer: D
The answer is D There is nothing like an AWS Management Console sign-in events event trigger
upvoted 2 times
hubekpeter
2 years, 8 months ago
Actually there’s https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-aws-console-sign-in-events.html
upvoted 2 times
...
...
ishitat
2 years, 10 months ago
Selected Answer: C
https://aws.amazon.com/premiumsupport/knowledge-center/root-user-account-eventbridge-rule/ refer this link
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago