exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 290 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 290
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company maintains an open-source application that is hosted on a public GitHub repository. While creating a new commit to the repository, an engineer uploaded their AWS access key and secret access keys. The engineer reported the mistake to a manager, and the manager immediately disabled the access key.
The company needs to assess the impact of the exposed access key. A security engineer must recommend a solution that requires the least possible managerial overhead.
Which solution meets these requirements?

  • A. Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.
  • B. Analyze Amazon CloudWatch Logs for activity by searching for the access key.
  • C. Analyze VPC flow logs for activity by searching for the access key.
  • D. Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Radhaghosh
Highly Voted 3 years, 5 months ago
Selected Answer: D
least amount of management overhead --> Answer D
upvoted 8 times
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: B
Best answer is B. The ask is to " assess the impact of the exposed access key", which mean how the exposed access key has been used. Credential report does not include such information, it includes information about the credential itself..when it was created, last used, last changed. Not useful to assess the impact.
upvoted 1 times
...
AWSvad
1 year, 8 months ago
D, according to ChatGPT. "Here's why Option D is the best choice: - AWS IAM provides a credential report that contains details about the AWS access keys associated with your IAM users. - The credential report includes information such as when each access key was last used. - Analyzing this report is a straightforward and efficient way to determine the last usage of the exposed access key. - It does not involve setting up additional logs or searching through logs, which can be more time-consuming and complex."
upvoted 1 times
...
Nuha_23
1 year, 10 months ago
Selected Answer: B
to assess the impact of the exposed access key. -> search for the access key in CloudWatch Logs
upvoted 1 times
...
captainpike
1 year, 11 months ago
Selected Answer: B
Question says "The company needs to assess the impact of the exposed access key." How can you analyze the impact with IAM Report "last used" info ? It has to be B
upvoted 2 times
...
Toptip
2 years, 1 month ago
Selected Answer: D
B can be true only if CloudTrail was enabled. since it was not mentioned in the question i pick D.
upvoted 2 times
Toptip
2 years, 1 month ago
Good article: https://aws.amazon.com/blogs/security/new-in-iam-quickly-identify-when-an-access-key-was-last-used/
upvoted 1 times
...
...
gtmnagalla
2 years, 4 months ago
Selected Answer: D
both B&D seems correct options but 'D' has less managerial overhead
upvoted 1 times
...
dcasabona
2 years, 11 months ago
Selected Answer: B
I agree that option D would be faster to check if the Access Key was used, but there is a gap of 4 hours to be generated. So, we could be looking at a past information. As CloudWatch is near real time, I would go for it - option B.
upvoted 4 times
...
Tesla_0011
3 years, 1 month ago
Selected Answer: B
Question is to examine the ramifications of the revealed access key. can only be done via option B i.e. Analyze Amazon CloudWatch Logs for activity by searching for the access key. You can configure CloudTrail with CloudWatch Logs to monitor your trail logs and be notified when specific activity occurs. The credential report in AWS Identity and Access Management (IAM) can only see when the access key was last used hence the answer is B (Analyze Amazon CloudWatch Logs for activity by searching for the access key)
upvoted 4 times
landsamboni
2 years, 7 months ago
Exactly, suppose the credential report tells you "the key was used 1 hour ago", how could you check the impact with only that information? you need to check when and also what was done using that key. That is why I think the answer is B
upvoted 1 times
landsamboni
2 years, 7 months ago
Correction: it is D. If the developer informed his supervisor immediately, the credential report would be enough to determine if the access key was used after the manager disabled it and the service used. However, I'm still not comfortable considering the impact measurement of this option. Still, I think D is the quickest and easy step to follow. Not necessarily the best.
upvoted 1 times
...
...
...
mongiam
3 years, 2 months ago
Selected Answer: D
D is a fast and simple way to see if leaked credentials were accessed.
upvoted 3 times
...
ceros399
3 years, 3 months ago
Selected Answer: D
D - is the ans
upvoted 2 times
...
MoreOps
3 years, 4 months ago
Selected Answer: D
D is the fastest and simplest way to see when it was last used , since it was deactivated as soon as it was reported, all you need is to see if the use time is later then the commit time.
upvoted 2 times
...
AliS2020
3 years, 5 months ago
D is correct access_key_1_last_used_region The AWS Region in which the access key was most recently used. When an access key is used more than once in a 15-minute span, only the first use is recorded in this field. The value in this field is N/A (not applicable) in these cases: The user does not have an access key. The access key has never been used. The access key was last used before IAM started tracking this information on April 22, 2015. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html The last used service is not Region-specific, such as Amazon S3.
upvoted 3 times
...
argol
3 years, 6 months ago
"D" is right GetCredentialReport
upvoted 3 times
...
ddm123
3 years, 6 months ago
Answer is D For those thinking about A - Bear in mind that TrustAdvisor can just notify you if your key is exposed and also check for existence of IAM user to discourage root access https://docs.aws.amazon.com/awssupport/latest/user/trusted-advisor-check-reference.html#exposed-access-keys
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...