exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 286 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 286
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company uses AWS CodePipeline for its software builds. Company policy mandates that code must be deployed to the staging environment before it is deployed to the production environment. The company needs to implement monitoring and alerting to detect when a CodePipeline pipeline is used to deploy code to production without the code first being deployed to staging.
What should a security engineer do to meet these requirements?

  • A. Enable Amazon GuardDuty to monitor AWS CloudTrail for CodePipeline. Configure findings through AWS Security Hub, and create a custom action in Security Hub to send to Amazon Simple Notification Service (Amazon SNS).
  • B. Use the AWS Cloud Development Kit (AWS CDK) to model reference-architecture CodePipeline pipeline that deploys application code through the staging environment and then the production environment.
  • C. Turn on AWS Config recording. Use a custom AWS Config rule to examine each CodePipeline pipeline for compliance. Configure an Amazon Simple Notification Service (Amazon SNS) notification on any change that is not in compliance with the rule. Add the desired receiver of the notification as a subscriber to the SNS topic.
  • D. Use Amazon Inspector to conduct an assessment of the CodePipeline pipelines and send a notification upon the discovery of a pipeline that is not in compliance. Add the desired receiver of the notification as a subscriber to the Amazon Simple Notification Service (Amazon SNS) topic.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jtzt2003
Highly Voted 3 years, 9 months ago
The answer is C. Can't be A: Security Hub just provides a view and isn't used for configuring findings or creating custom actions. Can't be B: Doesn't cover the requirements for monitoring and alerting Can't be D: Inspector checks for vulnerabilities, and doesn't check for compliance of CodePipeline. Answer is C:
upvoted 17 times
vbal
2 years, 10 months ago
You can create upto 50 custom actions in Security Hub. https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cwe-custom-actions.html
upvoted 1 times
...
kujin
2 years, 4 months ago
https://www.amazonaws.cn/en/guardduty/faqs/ Q: Can I write custom detections in Amazon GuardDuty? No. Amazon GuardDuty removes the heavy lifting and complexity of developing and maintaining your own custom rule sets. New detections are continuously added based on customer feedback and research done by Amazon Web Services services and the GuardDuty team. Customer configured customizations include adding your own Threat Lists and IP Safe Lists.
upvoted 1 times
...
...
dumma
Highly Voted 3 years, 9 months ago
agree it's A
upvoted 6 times
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: C
I think best answer is C. Using AWS Config you can evaluate CodePipeline configured stages, and if the stage of deploying in staging env is missing, then it is NON_COMPLIANT and can trigger a notification. Option A is not entirely wrong. It is feasible, but the wording is not clear and missing EventBridge..and it is a hassle.
upvoted 1 times
...
Toptip
2 years, 1 month ago
Selected Answer: C
C - AWS Config can do that
upvoted 1 times
Toptip
2 years, 1 month ago
https://docs.aws.amazon.com/config/latest/developerguide/codepipeline-deployment-count-check.html
upvoted 1 times
...
...
sahanpere
2 years, 5 months ago
Selected Answer: A
How on earth codepipeline execution is a config change for config to detect??
upvoted 1 times
...
vikaswalajay
2 years, 9 months ago
C definitely, config support pipelines for stag, env etc https://aws.amazon.com/about-aws/whats-new/2018/09/aws-config-adds-support-for-aws-codepipeline/
upvoted 2 times
...
cloud_collector
2 years, 9 months ago
Selected Answer: C
https://docs.aws.amazon.com/codepipeline/latest/userguide/detect-state-changes-cloudwatch-events.html
upvoted 1 times
...
vbal
2 years, 10 months ago
C is about changes to CodePipeline Configuration Changes not about Monitoring Indiviual pipeline flow. It can be done via CloudTrail API logs though. should be A.
upvoted 1 times
vbal
2 years, 10 months ago
https://docs.aws.amazon.com/codepipeline/latest/userguide/monitoring.html
upvoted 1 times
...
...
sapien45
2 years, 10 months ago
Selected Answer: C
You can now use AWS Config to record configuration changes to AWS CodePipeline, a continuous integration and continuous delivery service. With AWS Config, you can track changes to the pipeline configuration, such as the location of the artifacts, stages, actions included in a stage, and input and output artifacts. AWS Config maintains this configuration change history and you can access it through the console or APIs. Maintaining a change history can help you address audit and compliance requirements. https://aws.amazon.com/about-aws/whats-new/2018/09/aws-config-adds-support-for-aws-codepipeline/
upvoted 3 times
...
dcasabona
2 years, 11 months ago
Selected Answer: C
Option C seems to be the nest answer.
upvoted 1 times
...
lotfi50
3 years, 1 month ago
Selected Answer: C
The answer is C.
upvoted 1 times
...
AliS2020
3 years, 4 months ago
I think its B Give the CDK Pipelines way of doing things a shot first: you might find it does everything you need. If you want or need more control, we recommend you drop down to using the aws-codepipeline construct library directly. https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.pipelines-readme.html
upvoted 1 times
...
NSF2
3 years, 5 months ago
Agree it is C “With AWS Config, you can track changes to the pipeline configuration, such as the location of the artifacts, stages, actions included in a stage, and input and output artifacts.” https://aws.amazon.com/about-aws/whats-new/2018/09/aws-config-adds-support-for-aws-codepipeline
upvoted 3 times
...
ddm123
3 years, 6 months ago
C - https://aws.amazon.com/about-aws/whats-new/2018/09/aws-config-adds-support-for-aws-codepipeline/
upvoted 1 times
...
argol
3 years, 7 months ago
Use CloudTrail to capture API calls made by or on behalf of CodePipeline in your AWS account and deliver the log files to an Amazon S3 bucket. You can choose to have CloudWatch publish Amazon SNS notifications when new log files are delivered so you can take quick action. https://docs.aws.amazon.com/codepipeline/latest/userguide/monitoring.html
upvoted 1 times
...
IMAHM
3 years, 7 months ago
answer is A: https://docs.aws.amazon.com/codepipeline/latest/userguide/monitoring.html
upvoted 2 times
...
dfranco76
3 years, 7 months ago
C: You can now use AWS Config to record configuration changes to AWS CodePipeline https://aws.amazon.com/about-aws/whats-new/2018/09/aws-config-adds-support-for-aws-codepipeline/ I guess it cant be A because GuardDuty doesnt monitor Cloudtrail, It is CloudTrail which monitor Guarduty. Using the information collected by CloudTrail, you can determine the request that was made to GuardDuty https://docs.aws.amazon.com/guardduty/latest/ug/logging-using-cloudtrail.html
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...