exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 318 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 318
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company is outsourcing its operational support to an external company. The company's security officer must implement an access solution for delegating operational support that minimizes overhead.
Which approach should the security officer take to meet these requirements?

  • A. Implement Amazon Cognito identity pools with a role that uses a policy that denies the actions related to Amazon Cognito API management. Allow the external company to federate through its identity provider.
  • B. Federate AWS Identity and Access Management (IAM) with the external company's identity provider. Create an IAM role and attach a policy with the necessary permissions.
  • C. Create an IAM group for the external company. Add a policy to the group that denies IAM modifications. Securely provide the credentials to the external company.
  • D. Use AWS SSO with the external company's identity provider. Create an IAM group to map to the identity provider user group, and attach a policy with the necessary permissions.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MillarD
Highly Voted 3 years, 5 months ago
Selected Answer: B
Federate IAM with the external company's identity provider
upvoted 8 times
...
argol
Highly Voted 3 years, 6 months ago
"B" Federate IAM with the external company's identity provider
upvoted 5 times
...
Raphaello
Most Recent 1 year, 4 months ago
I can confidently say, none of these options is a sound secure solution. A. Cognito is basically used to web and application authentication/authorization. Not applicable to this scenario. B. Using external company's IdP is madness. The source of truth to user, groups, user metadata, authentication are all in the external company's control. Even creating roles in my account does not seem enough know that the source of truth is not at my company's control. External IdP without SCIM is a better (but not mention), as the source of truth will be in AWS SSO (Identity Center). C. IAM group is an identity, not used as authentication entity. D. Even worse than B, cause cannot use IAM group for mapping. It should be IAM role. But again, IdP of external company is not ideal secure wise! ------------------------------------- That being said, if this bad question ever shows up in your exam..select B, as the best of the rest, but know that this solution is not good enough unless using IdP without SCIM. This is important.
upvoted 1 times
...
Toptip
2 years, 1 month ago
Selected Answer: B
Only B makes sense.
upvoted 1 times
...
createchange
2 years, 4 months ago
Selected Answer: B
C is out of the question. A doesn't seem appropriate, due to the lack of concern about permissions. There should be more consideration than simply "stop them from modifying Cognito settings." D seemed right at first, but the wording is wrong. You don't assign permissions to an IAM group, you assign a Permission Set to a user/group provided by the IdP. As such, my vote is B.
upvoted 2 times
...
gtmnagalla
2 years, 4 months ago
Selected Answer: A
Amazon Cognito simplifies the development process by helping you manage identities for your customer-facing applications. As your application grows, some of your enterprise customers may ask you to integrate with their own Identity Provider (IdP) so that their users can sign-on to your app using their company’s identity, and have role-based access-control (RBAC) based on their company’s directory group membership.
upvoted 1 times
captainpike
1 year, 11 months ago
My problem with this answer is that the question is not talking about client application, it's talking about handing-off the operations of the AWS account
upvoted 1 times
...
...
awsec2
2 years, 6 months ago
B. Federate AWS Identity and Access Management (IAM) with the external company's identity provider. Create an IAM role and attach a policy with the necessary permissions. This approach allows the external company to use its own identity provider to authenticate users and access resources in the company's AWS account. By delegating the management of user identities and access to the external company's identity provider, the security officer minimizes the overhead of managing user access directly. The IAM role and policy can be used to grant the necessary permissions to the external company's users, allowing them to perform the required operational tasks while still maintaining control over access to the company's resources.
upvoted 1 times
...
hubekpeter
2 years, 7 months ago
Selected Answer: B
D is more suitable if you're configuring federation on organizational level and have many limitations.
upvoted 1 times
...
sapien45
2 years, 10 months ago
Selected Answer: D
D is an improvement of B. And yes, of course an AWS policy can be attached to a group. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_attach-policy.html
upvoted 1 times
...
AliS2020
3 years, 5 months ago
It should be B To create a role for identity federation (AWS CLI) Create a role: aws iam create-role Attach a permissions policy to the role: aws iam attach-role-policy or Create an inline permissions policy for the role: aws iam put-role-policy https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp.html
upvoted 2 times
...
NSF2
3 years, 5 months ago
Using 3rd party identity provider which makes me to go with Cognito, so answer A.
upvoted 3 times
...
sam_live
3 years, 5 months ago
I like the option D but I've a problem with the words "Create an IAM group to map to the identity provider user group". we map IAM roles to IdP groups not the groups. So the correct option should be A.
upvoted 1 times
...
YouYouYou
3 years, 5 months ago
Selected Answer: D
C is out of questions A & B and D are all the same from implementation and result point of view they require federation and they makes the life of support team easier however D is a much better and scalable solution and it gives the support the flexibility of adding new members to their support group nothing shared except the sign on url i'll go with D
upvoted 1 times
NSF2
3 years, 5 months ago
Would you ever think of doing this ? “Use AWS SSO with the external companyג€™s identity provider” Also the ambiguity around wording, as role can’t be mapped to a group.
upvoted 2 times
hubekpeter
2 years, 7 months ago
You're getting group membership as a claim, so that's exactly what you need to do. Map IAM role to some of the identity claims.
upvoted 1 times
...
...
...
argol
3 years, 6 months ago
If you already manage user identities outside of AWS, you can use IAM identity providers instead of creating IAM users in your AWS account. With an identity provider (IdP), you can manage your user identities outside of AWS and give these external user identities permissions to use AWS resources in your account. This is useful if your organization already has its own identity system, such as a corporate user directory. It is also useful if you are creating a mobile app or web application that requires access to AWS resources. When you use an IAM identity provider, you don't have to create custom sign-in code or manage your own user identities.
upvoted 1 times
network_zeal
3 years, 6 months ago
But isnt that also the case with cognito identity pools(option a)? identity management can be outside of your AWS account.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...