exam questions

Exam AWS-SysOps All Questions

View all questions & answers for the AWS-SysOps exam

Exam AWS-SysOps topic 1 question 657 discussion

Exam question from Amazon's AWS-SysOps
Question #: 657
Topic #: 1
[All AWS-SysOps Questions]

A company's Security team wants to track data encryption events across all company AWS accounts. The team wants to capture all AWS KMS events related to deleting or rotating customer master keys (CMKs) from all production AWS accounts. The KMS events will be sent to the Security team's AWS account for monitoring.
How can this be accomplished?

  • A. Create an AWS Lambda function that will run every few minutes in each production account, parse the KMS log for KMS events, and sent the information to an Amazon SQS queue managed by the Security team.
  • B. Create an event bus in the Security team's account, create a new Amazon CloudWatch Events rule that matches the KMS events in each production account, and then add the Security team's event bus as the target.
  • C. Set up AWS CloudTrail for KMS events in every production account, and have the logs sent to an Amazon S3 bucket that is managed by the Security team.
  • D. Create an AWS Config rule that checks for KMS keys that are in a pending deletion or rotated state in every production account, then send Amazon SNS notifications of any non-compliant KMS resources to the Security team.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
saumenP
Highly Voted 2 years, 7 months ago
C seems to be correct as KMS event goes to cloud trail
upvoted 12 times
...
coolboylqy
Highly Voted 2 years, 7 months ago
C https://docs.aws.amazon.com/kms/latest/developerguide/logging-using-cloudtrail.html
upvoted 9 times
...
DAAJ
Most Recent 9 months ago
Selected Answer: C
Answer is C. https://docs.aws.amazon.com/kms/latest/developerguide/kms-events.html "Whenever AWS KMS rotates key material, it sends a KMS CMK Rotation event to EventBridge. AWS KMS generates this event on a best-effort basis." "When you schedule deletion of a KMS key, AWS KMS enforces a waiting period before deleting the KMS key. After the waiting period ends, AWS KMS deletes the KMS key and sends a KMS CMK Deletion event to EventBridge. AWS KMS guarantees this EventBridge event." Because there is no guarantee for the CMK Rotation event in EventBridge, it is better to use CloudTrail instead of EventBridge.
upvoted 1 times
...
albert_kuo
9 months, 4 weeks ago
Selected Answer: C
Here's how this approach works: Enable AWS CloudTrail in each production account and configure it to capture KMS events. This ensures that all KMS-related events, including CMK deletion or rotation, are logged. Configure CloudTrail to send the KMS logs to an Amazon S3 bucket that is managed by the Security team. This allows centralized access and management of the logs. By implementing this approach, the Security team can collect the KMS event logs from all production accounts and monitor them for any relevant activities related to CMK deletion or rotation.
upvoted 1 times
...
gulu73
1 year, 2 months ago
Selected Answer: C
C is the answer
upvoted 1 times
...
Cyril_the_Squirl
2 years, 5 months ago
B is correct. All events are sent to cloudwatch using default event bus, with event bridge you can create a custom bus and a rule that selects the events you’re interested in, use your event is as the destination.
upvoted 2 times
juraj666
2 years, 3 months ago
event bus is feature of EventBridge, not CloudWatch Events
upvoted 1 times
...
...
ahaffar
2 years, 6 months ago
https://docs.aws.amazon.com/kms/latest/developerguide/understanding-kms-entries.html i believe it could be C CloudTrail supports the above KMS events
upvoted 1 times
...
saki0915
2 years, 6 months ago
I recommend B. C can also achieve its purpose, but it also includes unnecessary logs other than rotation and deletion. B can only get the events it needs. https://docs.aws.amazon.com/ja_jp/kms/latest/developerguide/monitoring-cloudwatch.html
upvoted 1 times
kenkct
2 years, 6 months ago
To track data encryption events as well, C is a better answer.
upvoted 1 times
...
...
abhishek_m_86
2 years, 6 months ago
C. Set up AWS CloudTrail for KMS events in every production account, and have the logs sent to an Amazon S3 bucket that is managed by the Security team.
upvoted 2 times
...
jackdryan
2 years, 6 months ago
I'll go with C
upvoted 1 times
...
jpush
2 years, 6 months ago
c https://docs.aws.amazon.com/kms/latest/developerguide/logging-using-cloudtrail.html
upvoted 1 times
...
MFDOOM
2 years, 6 months ago
C. Set up AWS CloudTrail for KMS events in every production account, and have the logs sent to an Amazon S3 bucket that is managed by the Security team.
upvoted 2 times
...
gispankaj
2 years, 6 months ago
its C.. all KMS events are covered by cloudtrail - https://docs.aws.amazon.com/kms/latest/developerguide/logging-using-cloudtrail.html
upvoted 1 times
...
zch
2 years, 6 months ago
B, take note of "KMS CMK Rotation" and "KMS CMK Deletion" which are not covered by CloudTrail. CloudWatch Event ==> KMS: state change Event Pattern Preview : KMS: state change Event ==> { "source": [ "aws.kms" ], "detail-type": [ "KMS Imported Key Material Expiration", "KMS CMK Rotation", "KMS CMK Deletion" ] }
upvoted 2 times
...
waterzhong
2 years, 7 months ago
should be C For an ongoing record of events in your AWS account, including events for AWS KMS, create a trail. A trail enables CloudTrail to deliver log files to an Amazon S3 bucket. By default, when you create a trail in the console, the trail applies to all regions. The trail logs events from all regions in the AWS partition and delivers the log files to the Amazon S3 bucket that you specify. Additionally, you can configure other AWS services to further analyze and act upon the event data collected in CloudTrail logs. For more information, see:
upvoted 2 times
...
gretch
2 years, 7 months ago
I belive it's B https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEvents-CrossAccountEventDelivery.html
upvoted 7 times
KhatriRocks
2 years, 7 months ago
Its so tempting, but CloudTrail is for auditing and we need to audit here so I'm for C
upvoted 1 times
...
...
AWS_Noob
2 years, 7 months ago
C - Because it needs to be shared with the security teams ACCOUNT. Which can be done via a bucket acl
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago