exam questions

Exam AWS DevOps Engineer Professional All Questions

View all questions & answers for the AWS DevOps Engineer Professional exam

Exam AWS DevOps Engineer Professional topic 1 question 74 discussion

Exam question from Amazon's AWS DevOps Engineer Professional
Question #: 74
Topic #: 1
[All AWS DevOps Engineer Professional Questions]

A company's application development team uses Linux-based Amazon EC2 instances as bastion hosts. Inbound SSH access to the bastion hosts is restricted to specific IP addresses, as defined in the associated security groups. The company's security team wants to receive a notification if the security group rules are modified to allow SSH access from any IP address.
What should a DevOps engineer do to meet this requirement?

  • A. Create an Amazon EventBridge (Amazon CloudWatch Events) rule with a source of aws.cloudtrail and the event name AuthorizeSecurityGroupIngress. Define an Amazon Simple Notification Service (Amazon SNS) topic as the target.
  • B. Enable Amazon GuardDuty and check the findings for security group in AWS Security Hub. Configure an Amazon EventBridge (Amazon CloudWatch Events) rule with a custom pattern that matches GuardDuty events with an output of NON_COMPLIANT. Define an Amazon Simple Notification Service (Amazon SNS) topic as the target.
  • C. Create an AWS Config rule by using the restricted-ssh managed rule to check whether security groups disallow unrestricted incoming SSH traffic. Configure automatic remediation to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic.
  • D. Enable Amazon Inspector. Include the Common Vulnerabilities and Exposures-1.1 rules package to check the security groups that are associated with the bastion hosts. Configure Amazon Inspector to publish a message to an Amazon Simple Notification Service (Amazon SNS) topic.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
saeidp
Highly Voted 2 years, 5 months ago
Selected Answer: C
I go with c. Between A and C, I select C because A will send an alert on all the Security group changes
upvoted 5 times
...
Venki_dev
Most Recent 1 year, 1 month ago
Selected Answer: C
Answer is C can use AWS Config rule like `restricted-ssh` to monitor security groups for unrestricted SSH access ensures that any non-compliant changes are detected immediately. its not A because , though Amazon EventBridge can be used to create a rule that triggers on specific events, the AuthorizeSecurityGroupIngress event does not provide information about the contents of the security group rule that was added, so it cannot be used to detect if SSH access from any IP address was allowed.
upvoted 1 times
...
failexamonly
1 year, 5 months ago
Selected Answer: C
Can't be A as any change to any port/ip will trigger it
upvoted 1 times
...
hotblooded
1 year, 5 months ago
Yes A will trigger event for every security group , Correct answer is C the rule will be non-compliant if cidr is 0.0.0.0 https://docs.aws.amazon.com/config/latest/developerguide/restricted-ssh.html
upvoted 1 times
...
DaddyDee
1 year, 10 months ago
I vote for A: With option C, the its only recording ipv4 0.0.0.0 what about ipv6 changes https://docs.aws.amazon.com/whitepapers/latest/ipv6-on-aws/ipv6-security-and-monitoring-considerations.html Option C only applies to ipv4 so any security group changes to ipv6 CIDR will not be recorded. (The rule is COMPLIANT when IP addresses of the incoming SSH traffic in the security groups are restricted (CIDR other than 0.0.0.0/0). This rule applies only to IPv4) https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html
upvoted 1 times
...
scottytoohotty
2 years, 2 months ago
Selected Answer: A
I agree with A after reading https://aws.amazon.com/premiumsupport/knowledge-center/monitor-security-group-changes-ec2/ and also interpreting the question as if ANY IP is added, not 0.0.0.0/0 like some suggested.
upvoted 1 times
...
daheck
2 years, 2 months ago
Selected Answer: A
I think that the core sentence is this - "Inbound SSH access to the bastion hosts is restricted to specific IP addresses". That means that we don't want change the current addresses at all or add additional ones. In other words we must to be notified for ANY IP changes, not only from 0.0.0.0/0.
upvoted 1 times
...
easytoo
2 years, 3 months ago
A for the win.
upvoted 3 times
...
ch_nam
2 years, 4 months ago
This sentence is key. "if the security group rules are modified to allow SSH access from any IP address. So I'd choose C. attention to Any IP address. C is "restricted-ssh managed rule" means that you will verify if your security group dont have setup 0.0.0.0/0 CIDR
upvoted 3 times
...
Bulti
2 years, 5 months ago
Selected Answer: C
C is the correct answer. A assumes that CloudTrail trail is created to send Cloudtrail events to CloudWatch logs. The link below defending A is using the event source as EC2 and event type as API call using CloudTrail but the option A talks about directly using CloudTrail as the source which is only possible if a trail is created to send events to CloudWatch Logs.
upvoted 2 times
...
rrshah83
2 years, 5 months ago
Selected Answer: A
https://aws.amazon.com/premiumsupport/knowledge-center/monitor-security-group-changes-ec2/
upvoted 3 times
...
sasivarenan
2 years, 5 months ago
Selected Answer: C
Restricted SSH rule seems good fit
upvoted 3 times
...
Bulti
2 years, 5 months ago
Answer is C. If you read the question properly it says change to any IP address which means 0.0.0.0/0 CIDR. So C is the best answer as the config rule will detect changes in the security group from restricted IP CIDR to any IP CIDR.
upvoted 2 times
CloudHustler
2 years, 5 months ago
'Any IP Address' doesn't mean 0.0.0.0/0 CIDR. It simply means ANY IP address. So if (10.10.0.10/32) was allowed ingress, the security team needs to get notified. Not only 0.0.0.0/0. So answer A would satisfy this
upvoted 2 times
...
...
ericzaj
2 years, 6 months ago
Selected Answer: C
The wording in the answers are confusing. I'll go with C though. The requirement is "The company's security team wants to receive a notification if the security group rules are modified to allow SSH access from any IP address." AWS Config is the right service to look for changes to baseline configurations.
upvoted 2 times
...
strike3test
2 years, 6 months ago
C is not the answer because restricted-ssh checks if the incoming SSH traffic for the security groups is accessible. The rule is COMPLIANT when IP addresses of the incoming SSH traffic in the security groups are restricted (CIDR other than 0.0.0.0/0). This rule applies only to IPv4.
upvoted 2 times
...
Chinta
2 years, 6 months ago
C is the best option
upvoted 2 times
...
Arkarter
2 years, 6 months ago
Selected Answer: A
I go with Choice A REF : https://aws.amazon.com/premiumsupport/knowledge-center/monitor-security-group-changes-ec2/
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...