exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 362 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 362
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company receives an email message from the AWS Abuse team. The message states that an IAM user in the company's AWS account has had an associated access key and secret access key pair published in public code repositories.

The identified AM user is designated as a service account. The IAM user uses hardcoded credentials in a critical customer-facing production application. There are no signs of a compromise within the company's AWS account. The company's security team must address this situation by implementing a solution that minimizes application downtime.

What is the correct order of actions for the security team to take to meet these requirements?

  • A. Delete any AWS Management Console credentials that are associated with the IAM user. Create a new access key and secret access key pair for the IAM user. Update the application to use the new credentials. Inactivate the publicly exposed IAM access key. Revoke any temporary AWS Security Token Service (AWS STS) credentials that are associated with the IAM user.
  • B. Revoke any temporary AWS Security Token Service (AWS STS) credentials that are associated with the IAM user. Inactivate the publicly exposed IAM access key. Create a new access key and secret access key pair for the IAM user. Update the application to use the new credentials. Delete any AWS Management Console credentials that are associated with the IAM user.
  • C. Inactivate the publicly exposed IAM access key. Create a new access key and secret access key pair for the IAM user. Update the application to use the new credentials. Revoke any temporary AWS Security Token Service (AWS STS) credentials that are associated with the IAM user. Delete any AWS Management Console credentials that are associated with the IAM user.
  • D. Delete any AWS Management Console credentials that are associated with the IAM user. Create a new access key and secret access key pair for the IAM user. Inactivate the publicly exposed IAM access key. Revoke any temporary AWS Security Token Service (AWS STS) credentials that are associated with the IAM user. Update the application to use the new credentials.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
secdaddy
Highly Voted 2 years, 5 months ago
Selected Answer: A
Requirement "solution that minimizes application downtime" A is the only one that updates the application before inactivating (this word actually exists!) the old credentials programmatic access.
upvoted 13 times
...
jamesf
Most Recent 9 months, 4 weeks ago
Selected Answer: A
I go for A as minimal downtime. 1. Delete any AWS Management Console credentials that are associated with the IAM user. 2. Create a new access key and secret access key pair for the IAM user. Update the application to use the new credentials. 3. Inactivate the publicly exposed IAM access key. 4. Revoke any temporary AWS Security Token Service (AWS STS) credentials that are associated with the IAM user. - step 1 wont impact application as application using access key. - IAM user can have 2 access key at same time. (step 2 then step 3)
upvoted 1 times
...
Arad
1 year ago
Selected Answer: A
A is correct with minimum downtime to the application.
upvoted 2 times
...
dsmynameew
1 year, 5 months ago
Selected Answer: A
Definitely A for lowest down time
upvoted 2 times
...
Green53
2 years ago
Selected Answer: C
The AWS blog post people reference state: 1. Determine what resources those credentials have access to 2. Invalidate the credentials so they can no longer be used to access your account 3. Consider invalidating any temporary security credentials that might have been issued using the credentials 4. Restore appropriate access Since this is an IAM user (and not a role), the application won't be using any temporary credentails (it's using a long term access key/secret). Based on the list above, I'd originally go C. It would cause a longer period of downtime, but would focus on deactivating the credentials *before* restoring access the application. However, it's confusing, since the question states there is no sign of compromise, and they want to minimise downtime. This would push me towards A (the fact the IAM credentials are removed first is strange). Create a second acces/secret key (IAM user can have two), update the application, then revoke/disable the other credentials. I can see both A and C being correct though, depending on the situation!
upvoted 1 times
...
vherman
2 years ago
Selected Answer: C
A cant be done. you first need to deactivate. So C is correct
upvoted 1 times
...
michele_scar
2 years ago
Selected Answer: C
A and D create immediate downtime. B it's not good because in the meanwhile you revoke STS and do anything, it should be created other session so it's C
upvoted 2 times
...
Toptip
2 years ago
Selected Answer: C
C makes sense.. it's not recommended to delete the credential immediately. better to disable them.
upvoted 2 times
...
ITGURU51
2 years, 1 month ago
Here are the steps that the security team can take to minimize downtime while addressing the situation: Create a new access key and secret access key pair for the IAM user. Update the application to use the new credentials. Inactivate the publicly exposed IAM access key. A
upvoted 1 times
...
c73bf38
2 years, 3 months ago
Selected Answer: C
Inactivate the publicly exposed IAM access key to prevent further unauthorized access to the AWS account is the first step, answer is C for me.
upvoted 2 times
...
Artaggedon
2 years, 3 months ago
Selected Answer: A
A - It's the only one that has a downtime close to zero and that's the priority in this case.
upvoted 2 times
...
Ell89
2 years, 3 months ago
Selected Answer: C
C - you cant delete keys without inactivating them first. Plus, A is stating to delete console credentials, which are not the same as programmatic keys.
upvoted 1 times
...
paczkin
2 years, 4 months ago
Selected Answer: C
Credentials deletion is not recommended as the first step. Preffered way is to inactivate them first as we can always return before app is updated. This removes options A and D. Answer B suggests to revoke temporary STS tokens first and as the last step to delete credentials. Here we have a threat that between these two actions the new temporary credentials can be created. https://aws.amazon.com/es/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/ I vote for C.
upvoted 3 times
...
PatrickLi
2 years, 4 months ago
Selected Answer: A
Upvote for A. What secdaddy said.
upvoted 1 times
...
yew2
2 years, 5 months ago
if the answer is B or C, then wouldn't the last step "Delete any AWS Management Console credentials that are associated with the IAM user." remove the new access keys that were just created ?
upvoted 2 times
Green53
2 years ago
Credentials (username/password) are not the same as the access keys.This is an IAM user (not a role).
upvoted 1 times
...
...
Subs2021
2 years, 6 months ago
C is the right answer and here is why. There are no signs of compromise and requirement is to ensure less downtime for application. If temp credential revoked first then application also will get impacted. so the correct answer is C
upvoted 4 times
...
amcloud
2 years, 6 months ago
Selected Answer: B
https://aws.amazon.com/es/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/ - B 2.Invalidate the credentials 3.Invalidating any temporary security credentials 4.Restore appropriate access It makes no sense to do 4 step before 3... The theat actor can be still inside.
upvoted 3 times
ryogoku
2 years, 6 months ago
If you first focus to invalidate short term credentials, the originally exposed keys can be used to generate new short term credentials. Following this logic and the documentation, I would opt for C.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...