exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 403 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 403
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company has an application that processes personally identifiable information (PII). The application runs on Amazon EC2 instances behind an Application Load Balancer (ALB). The company’s security policies require that data is encrypted in transit at all times to avoid the possibility of exposing any PII in plaintext.

Which solutions could a security engineer use to meet these requirements? (Choose two.)

  • A. Terminate SSL from clients on the existing ALB. Use HTTPS to connect from the ALB to the EC2 instances.
  • B. Replace the existing ALB with a Network Load Balancer (NLB). On the NLB, configure an SSL listener and TCP passthrough to receive client connections. Terminate HTTPS traffic from the NLB on the EC2 instances.
  • C. Replace the existing ALB with a Network Load Balancer (NLB). On the NLB, configure TCP passthrough to receive client connections. Terminate SSL from the NLB on the EC2 instances.
  • D. Configure a Network Load Balancer (NLB) with TCP passthrough to receive client connections. Terminate SSL on the existing ALB.
  • E. Configure a Network Load Balancer (NLB) with a TLS listener to receive client connections. Configure TCP passthrough on the existing ALB so that the NLB can reach the EC2 instances.
    Terminate SSL from the ALB on the EC2 instances.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kerar
Highly Voted 2 years, 6 months ago
Selected Answer: AC
A. SSL/TLS termination on ALB → Encryption in transit C. A Network Load Balancer only supports transport layer (layer 4) TCP listeners. HTTP and HTTPS traffic can be routed to your environment over TCP. To establish secure HTTPS connections between web clients and your environment, install a self-signed certificate on the environment's instances, and configure the instances to listen on the appropriate port (typically 443) and terminate HTTPS connections. https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/environments-cfg-nlb.html
upvoted 9 times
secdaddy
2 years, 5 months ago
Agree but if anyone has a configuration example of the re-encryption rule on the ALB I'd be interested in seeing it.
upvoted 2 times
...
nairj
2 years, 1 month ago
NLB does support TLS listeners but it will offload the certificate at NLB if the listener is TLS. If you use TCP then it's pass through to targets.
upvoted 2 times
...
...
Toptip
Most Recent 2 years ago
Selected Answer: AC
AC are correct
upvoted 1 times
...
nairj
2 years, 1 month ago
A and C NLB with TLS listeners, not SSL - https://docs.aws.amazon.com/elasticloadbalancing/latest/network/create-tls-listener.html https://docs.aws.amazon.com/elasticloadbalancing/latest/network/create-tls-listener.html
upvoted 1 times
nairj
2 years, 1 month ago
I meant NLB with TCP listener, not TLS .
upvoted 1 times
...
...
awsguru1998
2 years, 3 months ago
CE C. Replace the existing ALB with a Network Load Balancer (NLB). On the NLB, configure TCP passthrough to receive client connections. Terminate SSL from the NLB on the EC2 instances. This solution replaces the existing ALB with an NLB and uses TCP passthrough to receive client connections. SSL is terminated on the EC2 instances, ensuring end-to-end encryption of PII data in transit at all times. E. Configure a Network Load Balancer (NLB) with a TLS listener to receive client connections. Configure TCP passthrough on the existing ALB so that the NLB can reach the EC2 instances. Terminate SSL from the ALB on the EC2 instances. This solution configures an NLB with a TLS listener to receive client connections. TCP passthrough is configured on the existing ALB so that the NLB can reach the EC2 instances. SSL is terminated on the ALB, ensuring end-to-end encryption of PII data in transit at all times.
upvoted 1 times
...
createchange
2 years, 3 months ago
Selected Answer: BE
I vote for B,E. A doesn't add up to me. The encryption is not E2E as it is terminated and then was re-encrypted. This, by definition, would not be E2EE. E makes more sense to me: "Note that if you need to pass encrypted traffic to the targets without the load balancer decrypting it, create a TCP listener on port 443 instead of creating a TLS listener. The load balancer passes the request to the target as is, without decrypting it." Reference: https://docs.aws.amazon.com/elasticloadbalancing/latest/network/create-tls-listener.html
upvoted 1 times
Ell89
2 years, 3 months ago
A is E2E. there are no hops where it is unencrypted. encryption terminates and is re-established on the same resource/entity.
upvoted 1 times
...
...
swrp4595
2 years, 3 months ago
Selected Answer: AB
In Option B, the NLB is configured with an SSL listener, which allows the NLB to encrypt the data in transit between the client and the NLB. The NLB is also configured with TCP passthrough, which allows it to pass the encrypted data to the EC2 instances, and the HTTPS traffic is terminated from the NLB on the EC2 instances, ensuring that the data is encrypted in transit between the NLB and the EC2 instances as well. In Option C, the NLB is only configured with TCP passthrough, which does not encrypt the data in transit. As a result, this option does not meet the company's security policy requirements to encrypt data in transit at all times to avoid the possibility of exposing any personally identifiable information (PII) in plaintext.
upvoted 2 times
...
roguecloud
2 years, 4 months ago
Selected Answer: AC
Nitpicking, but maybe they intend you to pick up on this?... B states: "SSL listener and TCP passthrough," where the wording should be "TCP Listener and SSL Passthrough"(??)
upvoted 1 times
...
awsec2
2 years, 5 months ago
AD To encrypt the data in transit at all times, the security engineer could configure the existing ALB to terminate SSL from clients and use HTTPS to connect to the EC2 instances. This would encrypt the data in transit between clients and the ALB, and between the ALB and the EC2 instances.
upvoted 1 times
secdaddy
2 years, 5 months ago
No reason to keep the ALB if you put the NLB in doing tcp passthrough. The sessions will pass through the NLB and terminate directly on the EC2 instances.
upvoted 2 times
...
...
Un1c0rn
2 years, 5 months ago
Selected Answer: AD
AWS doc says; You can choose the type of load balancer that your environment uses only during environment creation. You can change settings to manage the behavior of your running environment's load balancer, but you can't change its type. https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/environments-cfg-nlb.html#:~:text=You%20can%20choose%20the%20type%20of%20load%20balancer%20that%20your%20environment%20uses%20only%20during%20environment%20creation.%20You%20can%20change%20settings%20to%20manage%20the%20behavior%20of%20your%20running%20environment%27s%20load%20balancer%2C%20but%20you%20can%27t%20change%20its%20type.
upvoted 1 times
...
Balki
2 years, 5 months ago
Selected Answer: AC
Basic understanding of ALB and NLB
upvoted 1 times
...
maddyr
2 years, 5 months ago
Selected Answer: AC
agree with A, C . Nice question
upvoted 1 times
...
Isaias
2 years, 6 months ago
Selected Answer: AC
A Terminate ssl on alb and configure Target group with https C or Replace with a NLB use listener 443 for passthrough the ssl terminate on the instances https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-target-groups.html https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...