exam questions

Exam AWS Certified SysOps Administrator - Associate All Questions

View all questions & answers for the AWS Certified SysOps Administrator - Associate exam

Exam AWS Certified SysOps Administrator - Associate topic 1 question 38 discussion

A company has a private Amazon S3 bucket that contains sensitive information. A SysOps administrator needs to keep logs of the IP addresses from authentication failures that result from attempts to access objects in the bucket. The logs must be stored so that they cannot be overwritten or deleted for 90 days.
Which solution will meet these requirements?

  • A. Create an AWS CloudTrail trail. Configure the log files to be saved to Amazon CloudWatch Logs. Configure the log group with a retention period of 90 days.
  • B. Create an AWS CloudTrail trail. Configure the log files to be saved to a different S3 bucket. Turn on CloudTrail log file integrity validation for 90 days.
  • C. Turn on access logging for the S3 bucket. Configure the access logs to be saved to Amazon CloudWatch Logs. Configure the log group with a retention period of 90 days.
  • D. Turn on access logging for the S3 bucket. Configure the access logs to be saved in a second S3 bucket. Turn on S3 Object Lock on the second S3 bucket, and configure a default retention period of 90 days.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kati2k22cz
Highly Voted 2 years, 11 months ago
Selected Answer: D
D. Learn more here: https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html
upvoted 11 times
...
princajen
Highly Voted 2 years, 11 months ago
I would have thought is A, but after reading I found this: "CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid). However, it does include logs for requests in which authorization fails (AccessDenied) and requests that are made by anonymous users." https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html
upvoted 10 times
cosmogen
2 years, 8 months ago
You are right, but read again the question:”keep logs of the IP addresses from authentication failures” that “result from attempts to access objects in the bucket” . “That result from attempts to access objects in the bucket” , for me it’s mean authorization fails(AccessDenied).So, for me B,C,D technically are not possible. Vote for A
upvoted 3 times
...
...
Yadong
Most Recent 1 week, 6 days ago
Selected Answer: B
A, C: cloudwatch logs could be deleted D: S3 buckets that have S3 Object Lock enabled can't be used as destination buckets for server access logs. Your destination bucket must not have a default retention period configuration. https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html B: CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid) or that fail due to redirection (error code 301 Moved Permanently). However, it does include logs for requests in which authorization fails (AccessDenied) and requests that are made by anonymous users. Also, desination s3 buckets could have S3 Object Lock. So B is the correct answer.
upvoted 1 times
...
kaka321
1 month, 2 weeks ago
Selected Answer: B
B is the correct answer. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-validation-intro.html
upvoted 2 times
...
Dinya_jui
7 months, 2 weeks ago
Selected Answer: D
I would have thought is A, but after reading I found this: "CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid). However, it does include logs for requests in which authorization fails (AccessDenied) and requests that are made by anonymous users." https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html
upvoted 1 times
...
numark
9 months ago
D: S3 Access Logging allows you to capture details of requests made to your S3 bucket, including failed attempts. This is critical for tracking authentication failures.By configuring the access logs to be saved to a second S3 bucket, you can separate the logs from the sensitive data in the original bucket, adding an extra layer of security and compliance.S3 Object Lock can be used to prevent object versions from being deleted or overwritten for a specified retention period. By turning on S3 Object Lock and setting the retention period to 90 days, you ensure that the access logs are immutable for the required duration.S3 Object Lock enforces a Write Once, Read Many (WORM) model, which is ideal for compliance and security use cases.
upvoted 1 times
...
joshnort
1 year, 5 months ago
Selected Answer: D
"CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid). However, it does include logs for requests in which authorization fails (AccessDenied) and requests that are made by anonymous users." https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html#:~:text=CloudTrail%20does%20not%20deliver%20logs%20for%20requests%20that%20fail%20authentication%20(in%20which%20the%20provided%20credentials%20are%20not%20valid).%20However%2C%20it%20does%20include%20logs%20for%20requests%20in%20which%20authorization%20fails%20(AccessDenied)%20and%20requests%20that%20are%20made%20by%20anonymous%20users.
upvoted 4 times
...
Rabbit117
1 year, 5 months ago
Selected Answer: D
I think D is correct. Its the only option which prevents the logs from being deleted. Cloud watch log retention will prevent the logs from expiring, but they can still be deleted.
upvoted 3 times
...
Learning4life
1 year, 6 months ago
Selected Answer: D
Simple answer is D. S3 authentication failures are not logged by Cloud Trail. See chart in link. https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html Turning on S3object lock, protects against accidental deletion. See link https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock.html
upvoted 5 times
...
ogogundare
1 year, 7 months ago
Selected Answer: D
D is the correct answer to keep tracks of access logging for s3 bucket
upvoted 2 times
...
tamng
1 year, 7 months ago
D is Correct not A
upvoted 1 times
...
Vinsmoke
1 year, 10 months ago
Selected Answer: D
B doesn't make sense with the log file integrity for 90 days bit - you don't configure log file integrity to only apply for a period of time.
upvoted 2 times
...
callspace
1 year, 10 months ago
Selected Answer: B
Looks like it is B. Server access logging provides detailed records for the requests that are made to a bucket. Server access logs are useful for many applications. For example, access log information can be useful in security and access audits. It can also help you learn about your customer base and understand your Amazon S3 bill. But Cloud Trail is capable of recording theIPs.So IPs recording, CloudTrail log file integrity validation for 90 days
upvoted 1 times
...
satamex
2 years ago
Its simple straightforward question . D it is
upvoted 1 times
...
Christina666
2 years ago
Selected Answer: D
Option D is the most appropriate solution because it covers the specific requirements mentioned in the question. By turning on access logging for the S3 bucket, you can capture the IP addresses from authentication failures. You then configure these access logs to be saved in a separate S3 bucket, ensuring data durability and separation from the source bucket. By enabling S3 Object Lock on the second S3 bucket and setting a default retention period of 90 days, you ensure that the logs cannot be deleted or overwritten for the specified duration.
upvoted 8 times
...
noahsark
2 years, 3 months ago
Selected Answer: B
maybe Create an AWS CloudTrail trail. Configure the log files to be saved to a different S3 bucket. Turn on CloudTrail log file integrity validation for 90 days. Notes: D is wrong because S3 buckets with S3 Object Lock can't be used as destination buckets for server access logs. https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
upvoted 1 times
Gomer
2 years, 3 months ago
Integrity validation doesn't stop someone form changing/deleting logs, it just detects it. The real solution requires protection of the files through versioning or object lock. After wasting a day analyzing all the solutions, I found real problems with each one as I listed. That is why the voting is fairly balanced. Something is wrong with the responses given
upvoted 1 times
...
...
Gomer
2 years, 3 months ago
NOT A: Can't configure CloudTrail to store logs in CloudWatch Logs. CloudTrail uses S3 bucket. CloudWatch Logs is not applicable. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html NOT B: "Integrity validation" is only designed to detect changes or deletions of CloudTrail logs. It depends on other security measures to block this. https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-validation-intro.html NOT C: Server access logging only delivers access logs for a source bucket to a target bucket. CloudWatch log group is not applicable. https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.htm NOT D: "S3 buckets with S3 Object Lock can't be used as destination buckets for server access logs." https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-overview.html https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html
upvoted 4 times
Gomer
2 years, 3 months ago
Both "A" and "C" are clearly not possible, and are excluded (IMHO). However, "B" and "D" also appear to be excluded for reasons cited. I do lean towards "D" because one clear requirement is to block log file deletion, not just detect it or automate it after 90 days. IMHO the real solution (not listed) would create a CloudTrail trail that logs S3 Data Events in seperate bucket, enable S3 Object Lock on that bucket with a retention period of 90 days, and enable Integrity Validation to detect any possible changes/deletions. Then I'd also figure out a lifecycle policy or some method to delete the logs sometimes after the 90 day requirement.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...